joblister-sql.txt

2007-08-14T00:00:00
ID PACKETSTORM:58513
Type packetstorm
Reporter Joseph Giron
Modified 2007-08-14T00:00:00

Description

                                        
                                            `  
JobLister3 by SkilMatch Staffing Systems, Inc.  
Multiple SQL injection vulnerabilities  
  
http://www.dubdubdub.com/  
  
http://www.skilmatch.com/  
  
The search form filed doesnt strip special characters that have special   
  
meanings. A single quote makes the application spit out a number of   
  
errors.   
  
This is not limited to the search query. The GET'd variables also fail to   
  
sanatize characters.   
Union selection:  
www.example.com/index.php?mode=showbyID&jobid=99786'%20union%20all%20sele  
  
ct%20something%20from%20something/*  
  
Dump of entries:  
www.example.com/index.php?mode=showbyID&jobid=99786'%20or%201=1/*  
  
Using some old fasioned order by work, wee deduce 16 columns  
www.example.com/index.php?mode=showbyID&jobid=99786'%20order%20by%2016/*  
  
Thus, the fix currently would be to impletement addslashes functions to   
  
all areas that recieve (or can recieve) user supplied data.   
`