Ê×Ò³ | °²È«ÎÄÕ | °²È«¹¤¾ß | Exploits | ±¾Õ¾Ô­´´ | ¹ØÓÚÎÒÃÇ | ÍøÕ¾µØͼ | °²È«ÂÛ̳
  µ±Ç°Î»ÖãºÖ÷Ò³>°²È«ÎÄÕÂ>ÎÄÕÂ×ÊÁÏ>Exploits>ÎÄÕÂÄÚÈÝ
PHPNuke EV 7.7 search module query variable SQL injection
À´Ô´£ºhttp://lostmon.blogspot.com/ ×÷ÕߣºLostmon ·¢²¼Ê±¼ä£º2006-01-10  

###############################################
PHPNuke EV 7.7 'search' module 'query' variable SQL injection
Vendor url: http://nukevolution.com/
exploit available:yes vendor notify:yes
advisore:http://lostmon.blogspot.com/2006/01/
phpnuke-ev-77-search-module-query.html
################################################

PHPNuke EV 7.7 have a flaw which can be exploited by malicious
people to conduct SQL injection attacks.

Input passed to the "query" parameter when performing a search isn't
properly sanitised before being used in a SQL query. This can be
exploited to manipulate SQL queries by injecting arbitrary SQL code.

#################
versions:
################

PHPNuke EV 7.7 -R1

posible prior versions are afected.

##################
solution:
###################

No solution at this time!!!

A posible fix:

Open file modules/Search/index.php and after this code:
------------------------------------
require_once("mainfile.php");
$instory = '';
$module_name = basename(dirname(__FILE__));
get_lang($module_name);
----------------------------------------------

you can add this other :

------------------------------------

if(eregi("UNION SELECT",$query) || eregi("UNION%20SELECT",$query)){
die();
}
----------------------------------------------
this is a "simple fix " only detect UNION SELECT comand and die
if this is in the query variable... you can write the same code for
UNION ALL SELECT or other varians of xploit

####################
Timeline
####################

discovered:21-11-2005
vendor notify:29-12-2005 (forums)
vendor response:-------
vendor fix:-----
disclosure:09-01-2006

###################
example:
###################

go to
http://[Victim]/modules.php?name=Search

and write in the search box this proof

s%') UNION SELECT 0,user_id,username,user_password,0,0,0,0,0,0 FROM nuke_users/*

all users hashes are available to view..

#################### €nd ########################

Thnx to estrella to be my ligth


--
atentamente:
Lostmon (lostmon@gmail.com)
Web-Blog: http://lostmon.blogspot.com/
--
La curiosidad es lo que hace mover la mente....



 
[ÍƼö] [ÆÀÂÛ(0Ìõ)] [·µ»Ø¶¥²¿] [´òÓ¡±¾Ò³] [¹Ø±Õ´°¿Ú]  
ÄäÃûÆÀÂÛ
ÆÀÂÛÄÚÈÝ£º(²»Äܳ¬¹ý250×Ö£¬ÐèÉóºËºó²Å»á¹«²¼£¬Çë×Ô¾õ×ñÊØ»¥ÁªÍøÏà¹ØÕþ²ß·¨¹æ¡£
 ¡ì×îÐÂÆÀÂÛ£º
  ÈȵãÎÄÕÂ
¡¤CVE-2012-0217 Intel sysret exp
¡¤Linux Kernel 2.6.32 Local Root
¡¤Array Networks vxAG / xAPV Pri
¡¤Novell NetIQ Privileged User M
¡¤Array Networks vAPV / vxAG Cod
¡¤Excel SLYK Format Parsing Buff
¡¤PhpInclude.Worm - PHP Scripts
¡¤Apache 2.2.0 - 2.2.11 Remote e
¡¤VideoScript 3.0 <= 4.0.1.50 Of
¡¤Yahoo! Messenger Webcam 8.1 Ac
¡¤Family Connections <= 1.8.2 Re
¡¤Joomla Component EasyBook 1.1
  Ïà¹ØÎÄÕÂ
¡¤WinRAR 3.3.0 and below local B
¡¤Venom Board version 1.22 SQL I
¡¤BlueCoat WinProxy Host: Header
¡¤Magic News Plus <=1.0.3 Adm
¡¤BlueCoat WinProxy HTTP DoS
¡¤Cisco IP Phone 7940 remote den
¡¤PHP mysql_connect Function Nam
¡¤xmame -lang local buffer overf
¡¤Microsoft Windows Kernel APC D
¡¤eStara Softphone buffer overfl
¡¤Fuju News 1.0 Authentication B
¡¤Â©¶´Ãû³Æ:Microsoft WindowsͼÐÎ
  ÍƼö¹ã¸æ
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved