目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2019-9053 PoC — CMS Made Simple SQL注入漏洞

来源
关联漏洞
标题:CMS Made Simple SQL注入漏洞 (CVE-2019-9053)
Description:CMS Made Simple(CMSMS)是CMSMS团队的一套开源的内容管理系统(CMS)。该系统支持基于角色的权限管理系统、基于向导的安装与更新机制、智能缓存机制等。 CMSMS 2.2.8版本中存在SQL注入漏洞,该漏洞源于基于数据库的应用缺少对外部输入SQL语句的验证。攻击者可利用该漏洞执行非法SQL命令。
Description
Improved code of Daniele Scanu SQL Injection exploit
介绍
# CVE-2019-9053
Improved code of Daniele Scanu SQL Injection exploit

Following changes applied:
- Added time control variable -t or --time that enables user to extend the timing of SQL injection (useful if a network connection in between hosts is subject of delays with packet transmission)
- Network exception handling added: to retry in case of a packet/connection/response lost (originally Python would throw an exception and You'd have to start over again)
- In case of getting hash/salt there is no need to use a full dictionary, as it is represended in hex, so alternate shorten dictionary is used [0123456789abcdef] to speed up the code
- Python3 required that hashlib.md5() arguments are to be encoded, so a hash finding function has been re-written accordingly

Enjoy!
文件快照

[4.0K] /data/pocs/c2a42e928c55932eafbf06f9c342372ae84ccbd7 ├── [8.8K] CVE-2019-9053.py ├── [ 18K] LICENSE └── [ 779] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。