FreeTicket 1.0.0 SQL Injection

Type packetstorm
Reporter Aliaksandr Hartsuyeu
Modified 2010-11-25T00:00:00


                                            `Subject: [] SQL injections in FreeTicket  
New eVuln Advisory:  
SQL injections in FreeTicket  
eVuln ID: EV0146  
Software: FreeTicket  
Vendor: Mrcgiguy  
Version: 1.0.0  
Critical Level: medium  
Type: SQL injection  
Status: Unpatched. No reply from developer(s)  
PoC: Available  
Solution: Not available  
Discovered by: Aliaksandr Hartsuyeu ( )  
1. 'id' SQL injection  
Vulnerability found in contact.php script.  
User-defined variable id is not properly sanitized before being used in SQL query.  
This can be used to execute arbitrary SQL query.  
2. 'email' SQL injection  
Vulnerable script is contact.php script.  
'email' parameter is not properly sanitized before being used in SQL query.  
Vulnerable code.  
There is no SQL injection filter is used:  
$email = $_POST["email"]; $id = $_POST["id"];  
if (!$id) {$id = $_GET[id];} if (!$email) {$email = $_GET[email];}  
$result=mysql_query("SELECT * FROM messages WHERE uid = \"$id\" AND email = \"$email\"");  
'id' SQL injection example.  
The following PoC code is available:' union select 1,2,3,4,5,6,7,8,9,10/*  
'email' SQL injection example.  
PoC code:' union select 1,1,1,1,1,1,1,1,1,1/*  
magic_quotes_gpc = off  
Not available  
Vulnerability discovered by Aliaksandr Hartsuyeu - recent XSS in bbcode