The_Arhitect Posted February 6, 2012 Report Posted February 6, 2012 XRayCMS 1.1.1 SQL Injection Vulnerability# Exploit Title: XRayCMS 1.1.1 SQL Injection Vulnerability# Date: 2/5/2012# Author: chap0# Software Link: http://sourceforge.net/projects/xraycms/files/latest/download# Version: 1.1.1# Tested on: UbuntuXRay CMS is vulnerable to a SQL Injection attack which allowsauthentication bypass into the admins account. If a malicioususer supplies ' or 1=1# into the applications user name fieldthey will be logged into the applications admin account.Jan 29, 2012 – Contacted Vendor No ResponseFeb 05, 2012 – Public DisclosureSince the vendor did not reply we attempted to create our ownfixes for this issue. The vulnerability exist in “login2.php”on lines 20 and 21.17 if(!isset($_POST['username'])) header("Location: login.php?error_username");18 if(!isset($_POST['password'])) header("Location: login.php?error_password");1920 $user = $_POST['username'];21 $pass = $_POST['password'];If the lines 20 and 21 are changed to:$user = mysql_real_escape_string($_POST['username']);$pass = mysql_real_escape_string($_POST['password']);This will prevent the sql injection from happening in the user name field.Sursa: XRayCMS 1.1.1 SQL Injection Vulnerability Quote