Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-9053 PoC — CMS Made Simple SQL注入漏洞

Source
Associated Vulnerability
Title:CMS Made Simple SQL注入漏洞 (CVE-2019-9053)
Description:An issue was discovered in CMS Made Simple 2.2.8. It is possible with the News module, through a crafted URL, to achieve unauthenticated blind time-based SQL injection via the m1_idlist parameter.
Description
Improved code of Daniele Scanu SQL Injection exploit
Readme
# CVE-2019-9053
Improved code of Daniele Scanu SQL Injection exploit

Following changes applied:
- Added time control variable -t or --time that enables user to extend the timing of SQL injection (useful if a network connection in between hosts is subject of delays with packet transmission)
- Network exception handling added: to retry in case of a packet/connection/response lost (originally Python would throw an exception and You'd have to start over again)
- In case of getting hash/salt there is no need to use a full dictionary, as it is represended in hex, so alternate shorten dictionary is used [0123456789abcdef] to speed up the code
- Python3 required that hashlib.md5() arguments are to be encoded, so a hash finding function has been re-written accordingly

Enjoy!
File Snapshot

[4.0K] /data/pocs/c2a42e928c55932eafbf06f9c342372ae84ccbd7 ├── [8.8K] CVE-2019-9053.py ├── [ 18K] LICENSE └── [ 779] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →