Waraxe IT Security Portal
Login or Register
November 5, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 118
Members: 0
Total: 118
Full disclosure
4 vulnerabilities in ibmsecurity
32 vulnerabilities in IBM Security Verify Access
xlibre Xnest security advisory & bugfix releases
APPLE-SA-10-29-2024-1 Safari 18.1
SEC Consult SA-20241030-0 :: Query Filter Injection in Ping Identity PingIDM (formerly known as ForgeRock Identity Management) (CVE-2024-23600)
SEC Consult SA-20241023-0 :: Authenticated Remote Code Execution in Multiple Xerox printers (CVE-2024-6333)
APPLE-SA-10-28-2024-8 visionOS 2.1
APPLE-SA-10-28-2024-7 tvOS 18.1
APPLE-SA-10-28-2024-6 watchOS 11.1
APPLE-SA-10-28-2024-5 macOS Ventura 13.7.1
APPLE-SA-10-28-2024-4 macOS Sonoma 14.7.1
APPLE-SA-10-28-2024-3 macOS Sequoia 15.1
APPLE-SA-10-28-2024-2 iOS 17.7.1 and iPadOS 17.7.1
APPLE-SA-10-28-2024-1 iOS 18.1 and iPadOS 18.1
Open Redirect / Reflected XSS - booked-schedulerv2.8.5
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> Sql injection -> Help with SQL Injection version 3
Post new topicReply to topic View previous topic :: View next topic
Help with SQL Injection version 3
PostPosted: Wed Apr 01, 2009 1:31 pm Reply with quote
Hanna313
Active user
Active user
Joined: Dec 17, 2008
Posts: 26




Hello,

I found a site which is vulnerable for SQL injection, with a @@version query I found out that it runs mysql v3.0 with:

www.site.com/......id=131 and substring(@@version,1,1)=3

What can I do now to inject SQL? since I read that union and subselect queries won't work with v3.0


Last edited by Hanna313 on Wed Apr 01, 2009 1:54 pm; edited 1 time in total
View user's profile Send private message
PostPosted: Wed Apr 01, 2009 1:54 pm Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




In case of MySql 3.x it all depend of the table(s), which are accessed with affected sql query. As there is no UNION and subselects, then you are not able to access other tables. So - if you are lucky and sql injection occurs in query, which deals with users table (login, password restore, etc scripts), then you have access to user credentials. But if for example you have sql injection in news script, which deals with news table, then it is obviously not useful. Of course, you can fetch some data - DATABASE(), USER(),etc.
INTO OUTFILE, LOAD_FILE() may be extremely useful too, if you have FILE privilege (not common in real-world situations).

Conclusion: MySql 3.x sucks Smile
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Wed Apr 01, 2009 2:10 pm Reply with quote
Hanna313
Active user
Active user
Joined: Dec 17, 2008
Posts: 26




Hello Waraxe,

Can you please explain what you mean by this:

waraxe wrote:
Of course, you can fetch some data - DATABASE(), USER(),etc.
INTO OUTFILE, LOAD_FILE() may be extremely useful too, if you have FILE privilege (not common in real-world situations).


Maybe with some example queries?

Thanks in advance!
View user's profile Send private message
PostPosted: Wed Apr 01, 2009 2:31 pm Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




It's sql injection basics, Internet is full of related tutorials and manuals.
Some useful links:

http://ferruh.mavituna.com/sql-injection-cheatsheet-oku/

http://dev.mysql.com/doc/refman/5.1/en/other-functions.html
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Wed Apr 01, 2009 3:03 pm Reply with quote
Hanna313
Active user
Active user
Joined: Dec 17, 2008
Posts: 26




The url on this website that requires login looks like this:

www.site.com/index.asp?lg=2

Is there any way to exploit this?

When I put magic quotes like this:

www.site.com/index.asp?lg='

It returns:

Microsoft OLE DB Provider for ODBC Drivers error '80004005'

[Oracle][ODBC][Ora]ORA-01756: quoted string not properly terminated

/index.asp, line 100
View user's profile Send private message
PostPosted: Wed Apr 01, 2009 3:25 pm Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




This is Oracle, not MySql. And you don't need single quotes here.
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Wed Apr 01, 2009 6:24 pm Reply with quote
Hanna313
Active user
Active user
Joined: Dec 17, 2008
Posts: 26




Okey and is it possible to exploit such an error?
View user's profile Send private message
PostPosted: Thu Apr 02, 2009 9:33 am Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




http://ferruh.mavituna.com/oracle-sql-injection-cheat-sheet-oku/
View user's profile Send private message Send e-mail Visit poster's website
Help with SQL Injection version 3
www.waraxe.us Forum Index -> Sql injection
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 1 of 1

Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.034 Seconds