iScripts EasySnaps 2.0 – Multiple SQL Injections

  • 作者: Salvatore Fresta
    日期: 2010-07-01
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/14162/
  • iScripts EasySnaps 2.0 Multiple SQL Injection Vulnerabilities
    
     NameiScripts EasySnaps
     Vendorhttp://www.iscripts.com
     Versions Affected 2.0
    
     AuthorSalvatore Fresta aka Drosophila
     Website http://www.salvatorefresta.net
     Contact salvatorefresta [at] gmail [dot] com
     Date2010-01-07
    
    X. INDEX
    
     I.ABOUT THE APPLICATION
     II. DESCRIPTION
     III.ANALYSIS
     IV. SAMPLE CODE
     V.FIX
     
    
    I. ABOUT THE APPLICATION
    
    EasySnaps is a commercial powerful image hosting site that
    will helpyouin hosting your images besides providing a
    large number of utilities.
    
    
    II. DESCRIPTION
    
    Somefieldsare not properly sanitised before being used
    in SQL queries.
    
    
    III. ANALYSIS
    
    Summary:
    
     A) Blind SQL Injection
     B) SQL Injection
     
    
    A) Blind SQL Injection
    
    The comment parameter in add_comments.php is notproperly
    sanitised before being used in a INSERT type SQL query. 
    
    
    B) SQL Injection
    
    The values parameter in tags_details.php (search form) is
    notproperlysanitised before used in a SQL query. This
    can beexploitedto manipulate SQL queries by injecting
    arbitrary SQL code.
    Successful exploitation requiresthat \\\"magic_quotes_gpc\\\"
    is disabled.
    
    ThereisaSQLinjectionthat maybe may be exploited
    bypassingtheinternalfilters in the begin parameter.
    The affected file is greetings.php.
    
    I tryed to test the upload forms for found arbitrary file
    uploadflawsbut I could not do anything because of the
    following error: \\\"Your Image Count is full!\\\".
    
    
    IV. SAMPLE CODE
    
    B) SQL Injection
    
    POST /gallery/demo/tags_details.php HTTP/1.1
    Host: site
    Content-Type: application/x-www-form-urlencoded
    Cookie: your_php_sessid
    Content-Length: 84 
    
    values=%25\\\' UNION SELECT 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20#&jumb=Go
    
    You can inject the previous code using the search form in
    tags_details.php page.
    
    
    V. FIX
    
    No Fix.