This Perl script exploits a SQL injection vulnerability in ASPSitem <= 1.83 by crafting a malicious HTTP request to extract user credentials, including usernames, MD5 password hashes, and email addresses. The exploit leverages a UNION-based SQL injection in the 'id' parameter of the 'Haberler.asp' page.
Classification
Working Poc 95%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:ASPSitem <= 1.83
No auth needed
Prerequisites:Target must be running ASPSitem <= 1.83 · Target must have the vulnerable 'Haberler.asp' page accessible