phpCheckZ 1.1.0 – Blind SQL Injection

  • 作者: Salvatore Fresta
    日期: 2010-10-19
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/15284/
  • phpCheckZ 1.1.0 Blind SQL Injection Vulnerability
    
     NamephpCheckZ
     Vendorhttp://www.phpcheckz.com
     Versions Affected 1.1.0
    
     AuthorSalvatore Fresta aka Drosophila
     Website http://www.salvatorefresta.net
     Contact salvatorefresta [at] gmail [dot] com
     Date2010-10-19
    
    X. INDEX
    
     I.ABOUT THE APPLICATION
     II. DESCRIPTION
     III.ANALYSIS
     IV. SAMPLE CODE
     V.FIX
     
    
    I. ABOUT THE APPLICATION
    ________________________
    
    phpCheckZ is a web application that allows you toeasily
    create checklists for your website. 
    
    
    II. DESCRIPTION
    _______________
    
    A parameter is not properly sanitisedbeforebeing used
    in a SQL query.
    
    
    III. ANALYSIS
    _____________
    
    Summary:
    
     A) Blind SQL Injection
     
    
    A) Blind SQL Injection
    ______________________
    
    The parameters id in chart.php isnot properly sanitised
    before being used in a SQLquery. Thiscan be exploited
    to manipulate SQL queries by injecting arbitrary SQL code.
    
    Successful exploitationrequires that "magic_quotes_gpc"
    is disabled. 
    
    
    IV. SAMPLE CODE
    _______________
    
    A) Blind SQL Injection
    
    http://site/path/chart.php?id=1' AND '1'='1
    http://site/path/chart.php?id=1' AND '1'='0
    
    
    V. FIX
    ______
    
    No fix.