[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

MySQL 4.x/5.0 User-Defined Function Command Execution Exploit (win)

Author
Marco Ivaldi
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-8830
Category
remote exploits
Date add
06-02-2007
Platform
unsorted
===================================================================
MySQL 4.x/5.0 User-Defined Function Command Execution Exploit (win)
===================================================================

-- raptor_winudf.sql - A MySQL UDF backdoor kit for Windows
-- Copyright (c) 2007 Marco Ivaldi 
--
-- This is a MySQL backdoor kit for Windows based on the UDFs (User Defined
-- Functions) mechanism. Use it to spawn a reverse shell (netcat UDF on port 
-- 80/tcp) or to execute single OS commands (exec UDF). Don't forget to edit
-- the MySQL bin path below according to your target's configuration.
--
-- Thanks to KDM for asking me to do research on this interesting subject!
--
-- See also:
-- http://www.0xdeadbeef.info/exploits/raptor_udf.c
-- http://www.0xdeadbeef.info/exploits/raptor_udf2.c
--
-- Tested on:
-- MySQL 4.0.18-win32 (running on Windows XP SP2)
-- MySQL 4.1.22-win32 (running on Windows XP SP2)
-- MySQL 5.0.27-win32 (running on Windows XP SP2)

download:

http://www.inj3ct0r.com/sploits/8830.tgz




#  0day.today [2024-11-15]  #