Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-9053 PoC — CMS Made Simple SQL注入漏洞

Source
Associated Vulnerability
Title:CMS Made Simple SQL注入漏洞 (CVE-2019-9053)
Description:CMS Made Simple(CMSMS)是CMSMS团队的一套开源的内容管理系统(CMS)。该系统支持基于角色的权限管理系统、基于向导的安装与更新机制、智能缓存机制等。 CMSMS 2.2.8版本中存在SQL注入漏洞,该漏洞源于基于数据库的应用缺少对外部输入SQL语句的验证。攻击者可利用该漏洞执行非法SQL命令。
Description
working exploit for CVE-2019-9053 
Readme
# CVE-2019-9053-exploit
working exploit for CVE-2019-9053 

I edited oryginal exploit and now its working well. Oryginal exploit had some problems like missing syntax. 

Usage: 

Example usage (no cracking password): exploit.py -u http://target-uri

Example usage (with cracking password): exploit.py -u http://target-uri --crack -w /path-wordlist

If you get this when cracking a password:

```[*] Now try to crack password
Traceback (most recent call last):
  File "/home/home/Simple_CTF/exploit.py", line 184, in <module>
    crack_password()
  File "/home/user/Simple_CTF/exploit.py", line 53, in crack_password
    for line in dict.readlines():
                ^^^^^^^^^^^^^^^^
  File "<frozen codecs>", line 322, in decode
UnicodeDecodeError: 'utf-8' codec can't decode byte 0xf1 in position 933: invalid continuation byte
```

Just try convert Your wordlist to UTF8: 

iconv -f ISO-8859-1 -t UTF-8 /usr/share/wordlists/rockyou.txt > rockyou_utf8.txt

If it still won't work try passwordcracker.py but remember to change salt and pasword value before start cracking

File Snapshot

[4.0K] /data/pocs/9c338214a23404f1f904ed36e6b7cd1a80f169ee ├── [6.1K] exploit.py ├── [ 378] passwordcracker.py └── [1.0K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.