===============================================================================
Calendarix (cal_cat.php) SQL Injection Vulnerability
===============================================================================
Author: SixP4ck3r
Email & msn : SixP4ck3r@Bolivia.com
Date:17 July 2010
Critical Lvl: High
Impact: Exposure of sensitive information
Where : From Remote
web : http://foro.nbsecurity.net/
Credits : Diablada and Caporal is Bolivian
Dork : inurl:cal_cat.php?op=---------------------------------------------------------------------------[Sofware afected info]
Calendarix it's a events manager based in web write in php, requiere
mysql for database.[Download]
http://www.calendarix.com/[Afected versions]
All +0 day
---------------------------------------------------------------------------[Bug]if($limit>$totalrows) $limit =0;
$query .=" LIMIT ".$limit.",".$limitrow ;
$query ="select ".$qstr.$query ;// echo "<h4>".$query."</h4>";
$result = mysql_query($query);
$rowname = mysql_fetch_object($result);
$rows = mysql_num_rows($result);---------------------------------------------------------------------------[Exploting..demo]
http://example/[path]/calendar/cal_cat.php?op=cat&id=1&year=2010&sort=&catmonth=6&catview=0&limit=[SQL]---------------------------------------------------------------------------
With R3gards,
SixP4ck3r from Bolivia
___eof____