|
######################################################=0D
# =0D
# Title: PHPQuiz <= v.1.2 Remote SQL injection/Code Execution Exploit=0D
# Vendor : PHPQuiz=0D
# webiste : http://www.phpquiz.com=0D
# Version : <= v.1.2=0D
# Severity: Critical =0D
# Author: Simo64 / simo64_at_morx_org=0D
# MorX Security Reseach Team=0D
# http://www.morx.org=0D
# http://www.morx.org/phpquiz.txt=0D
#=0D
# Details : =0D
#=0D
# SQL injection=0D
#***************************=0D
#=0D
# univers var in score.php and quiz_id var in home.php are not proprely verified and can be used to inject query=0D
#=0D
# PoC : http://localhost/phpquiz/front/?what=score&univers=[SQL]=0D
# http://localhost/phpquiz/front/?quiz=quiz&univers=1&step=1&quiz_id=[SQL]=0D
#=0D
# Arbitary File Upload=0D
#********************** =0D
# vulnerable code in back/upload_img.php and admin/upload_img.php near lines 74-76=0D
# =0D
# 74 if (($upload) && ($ok_update == "yes")) {=0D
# 75=0D
# 76 if(@copy($image, $path)){=0D
# 77 .....=0D
#=0D
# $upload , $ok_update , $image , $path variables are not sanitized and can be used to upload files=0D
# =0D
# PoC Exploit : =0D
#=0D
#