Jump to content
Nytro

Google Maps - Remote File Disclosure /SQL Injection Vulnerability

Recommended Posts

Posted

1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0 _ __ __ __ 1
1 /' \ __ /'__`\ /\ \__ /'__`\ 0
0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1
1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0
0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1
1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0
0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1
1 \ \____/ >> Exploit database separated by exploit 0
0 \/___/ type (local, remote, DoS, etc.) 1
1 1
0 [x] Official Website: http://www.1337day.com 0
1 [x] Support E-mail : mr.inj3ct0r[at]gmail[dot]com 1
0 0
1 ========================================== 1
0 I'm Taurus Omar Member From Inj3ct0r TEAM 1
1 ========================================== 0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-=-1
| |
| C _:_ A | | C _:_ A |
| Google Maps - Remote File Disclosure /SQL Injection Vulnerability |
--------------------------------------------------------------------------

==> ABOUT ME:
--- TAURUS OMAR
--- INDEPENDENT SECURITY RESEARCHER
--- ACCESOILEGAL.BLOGSPOT.COM
--- @omartaurus
--- omar-taurus[at]dragonsecurity[dot]org
--- omar-taurus[at]live[dot]com

===> INFO:
Author : TAURUS OMAR
Category : Webapps / 0day
Title Exploit : Google Maps - Remote File Disclosure /SQL Injection Vulnerability
Vendor : Google Maps
URL Vendor : http://maps.google.com/
0day exploits : 1337day.com Inj3ct0r Exploit DataBase

++++++++++++++++++++++++++++++++++++

Proof of CONCEPT IMAGES :

http://img256.imageshack.us/img256/5621/googlemapsr.jpg

http://img341.imageshack.us/img341/995/googlemaps2i.jpg

++++++++++++++++++++++++++++++++++++


==> SAMPLE'S SQLi:
http://maps.google.com/maps?q=1001%20+longwod+%20road+%2019348 [SQL Injection]
http://maps.google.com/maps?q=1001%20+Webb%20+Rd+%20Chadds%20+Ford+%20Delaware+%20Pennsylvania+%2019317 [SQL Injection]
http://maps.google.com/maps?q=1001%20+Webb%20+Rd+%20Wolverine+%20Cheboygan+%20Michigan+%2049799 [SQL Injection]
http://maps.google.com/maps?q=1001%20+Webb%20+Rd+%20Crum+%20Wayne+%20West+%20Virginia+%2025669 [SQL Injection]
http://maps.google.com/maps?q=1001%20+Webb%20+Rd+%20Simpsonville+%20Shelby+%20Kentucky+%2040067 [SQL Injection]
http://maps.google.com/maps?q=1001%20+Webb%20+Rd+%20Cottage+%20Grove+%20Weakley+%20Tennessee+%2038224 [SQL Injection]
http://maps.google.com/maps?q=1001%20+Webb%20+Rd+%20Dothan+%20Houston+%20Alabama+%2036303 [SQL Injection]
http://maps.google.com/maps?q=1001%20+Webb%20+Rd+%20Clarksville+%20Montgomery+%20Tennessee+%2037040 [SQL Injection]
http://maps.google.com/maps?q=1001%20+Webb%20+Rd+%20Chattanooga+%20Hamilton+%20Tennessee+%2037416 [SQL Injection]
http://maps.google.com/maps?q=1001%20+Webb%20+Rd+%20Ellenboro+%20Rutherford+%20North+%20Carolina+%2028040 [SQL Injection]

==>REMOTE FILE DISCLOSURE

http://maps.google.com/ads/displaynetwork/adtypes/xxxxx/../../../../maps/ms

----------------------------------------------------------------------------

http://maps.google.com/ads/displaynetwork/adtypes/hilton-300x250.html/../../../../maps/ms
http://maps.google.com/ads/displaynetwork/adtypes/lenovo-728x90.html/../../../../maps/ms


# 1337day.com [2012-06-22]

Sursa: Inj3ct0r Member found Google Maps Remote File Disclosure / SQL Injection | Inj3ct0r - exploit database : vulnerability : 0day : shellcode

Nu pare sa mearga, nu acum :-?

Oricum injectorii astia sunt de cacat, se lauda cu exploit-uri gasite de altii si sunt cam paraleli cu orice, deci probabil fake, dar na, nu pot fi sigur.

Posted (edited)

In poza se vede o eroare MySQL.

Sunt 100% sigur ca e fake, deoarece Google nu foloseste MySQL, ci Bigtable.

BigTable - Wikipedia, the free encyclopedia

L.E.: Acela nu e File Discosure. Browserul interpreteaza acel `../` ca un director in sus.

Dovada:


totti93@totti93-MS-7255:~$ curl http://maps.google.com/ads/displaynetwork/adtypes/xxxxx/../../../../maps/ms
<title>Error 404 (Not Found)!!1</title>
<p>The requested URL <code>/ads/displaynetwork/adtypes/xxxxx/../../../../maps/ms</code> was not found on this server. <ins>That’s all we know.</ins>

Mai sus am luat doar partea importanta a raspunsului.


totti93@totti93-MS-7255:~$ curl http://maps.google.com/maps/ms
{errorText:"Unable to contact server."}

Deci se observa ca nu e File Disclosure.

Ca test, puteti verifica asta:


https://rstcenter.com/forum/../js/feed_menu.js

Sper ca v-am convins ca e FAKE.

Edited by totti93

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...