关联漏洞
标题:
Drupal core SQL注入漏洞
(CVE-2014-3704)
描述:Drupal是Drupal社区所维护的一套用PHP语言开发的免费、开源的内容管理系统。 Drupal core 7.3之前7.x版本中的database abstraction API中‘expandArguments’函数存在安全漏洞,该漏洞源于程序没有正确构造预处理语句。远程攻击者可借助带有特制键的数组利用该漏洞实施SQL注入攻击。
描述
This code is taken from "Drupal 7.0 < 7.31 - 'Drupalgeddon' SQL Injection (Add Admin User)" and was converted to Python 3 to suit the exercise in Academy for Module "Attacking Commoon Applications" and section "Attacking Drupal".
介绍
# Code Conversion to Python 3
This code is taken from ["Drupal 7.0 < 7.31 - 'Drupalgeddon' SQL Injection \(Add Admin User\)"](https://www.exploit-db.com/exploits/34992) and was converted to Python 3 to suit the exercise in [Academy](http://academy.hackthebox.com/) for Module "Attacking Commoon Applications" and section "Attacking Drupal".
The original code was written in Python 2, but I converted it to be compatible with Python 3. The readme structure is copied from [here](https://github.com/dpgg101/CVE-2019-10945/blob/main/README.md).
## Requirements
To run this code, you will need Python 3 installed on your system.
## Usage
To run the code, simply execute the script in a terminal or command prompt using Python 3. For example:
```bash
$ wget https://github.com/joaomorenorf/CVE-2014-3704/raw/refs/heads/master/CVE-2014-3704.py
$ python3 CVE-2014-3704.py
```
## Contributing
If you find any issues with the code or have suggestions for improvements, please feel free to open an issue or submit a pull request.
文件快照
[4.0K] /data/pocs/0349b2cfb557fde77d313824f4294a6b272cc470
├── [ 12K] CVE-2014-3704.py
├── [1.0K] LICENSE
└── [1.0K] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。