Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2012-5613 PoC — Oracle MySQL 配置错误漏洞

Source
Associated Vulnerability
Title:Oracle MySQL 配置错误漏洞 (CVE-2012-5613)
Description:Oracle MySQL是美国甲骨文(Oracle)公司的一套开源的关系数据库管理系统。 Oracle MySQL 存在配置错误漏洞。攻击者利用该漏洞添加新增的管理用户,控制受影响数据库系统。
Description
MySQL-Fu is a Ruby based MySQL Client Script I wrote.  It does most of the stuff a normal MySQL client might do: SQL Shell, Update/Delete/Drop Database/Table, Add/Delete Users, Dump Database(s)/Table w/ option for gzip...... Plus a few extra options  to make life a little easier for pentests. Includes Several builtin PHP Command Shell options as well as Pentestmonkey's PHP Reverse Shell, in addition to multiple options for file writing and reading (all files read logged locally for offline analysis later), also includes Ruby port of Kingcope's CVE-2012-5613 Linux MySQL Privilege Escalation Exploit.
Readme
MySQL-Fu.rb
===========

MySQL-Fu is a Ruby based MySQL Client Script I wrote.

It does most of the stuff a normal MySQL client might do: SQL Shell, Update/Delete/Drop Database/Table, Add/Delete Users, Dump Database(s)/Table w/ option for gzip......

Plus a few extra options  to make life a little easier for pentests. 

Includes Several builtin PHP Command Shell options as well as Pentestmonkey's PHP Reverse Shell, in addition to multiple options for file writing and reading (all files read logged locally for offline analysis later), also includes Ruby port of Kingcope's CVE-2012-5613 Linux MySQL Privilege Escalation Exploit.
File Snapshot

[4.0K] /data/pocs/6f95f14ec20faa7abf02472ef6ff46ac831b06d2 ├── [ 71K] MySQL-Fu.rb ├── [ 634] README.md └── [2.3K] usage.txt 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.