Home / exploits [webapps / 0day] - VideoDB <= 3.0.3 Multiple Remote Vulne
Posted on 09 October 2010
<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Strict//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd'><html xmlns='http://www.w3.org/1999/xhtml'><head><meta http-equiv='Content-Type' content='text/html; charset=utf-8' /><meta http-equiv='Content-Language' content='en' /><title>VideoDB <= 3.0.3 Multiple Remote Vulnerabilities | Inj3ct0r - exploit database : vulnerability : 0day : shellcode</title><meta name='description' content='VideoDB <= 3.0.3 Multiple Remote Vulnerabilities by Valentin Hobel in webapps / 0day | Inj3ct0r - exploit database : vulnerability : 0day : shellcode' /><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon' /><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss' /><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></head><body><pre>================================================ VideoDB <= 3.0.3 Multiple Remote Vulnerabilities ================================================ # Exploit Title: VideoDB Multiple Vulnerabilities # Date: 09.10.2010 # Author: Valentin # Category: webapps/0day # Version: 3.0.3 and earlier # Tested on: # CVE : # Code : [:::::::::::::::::::::::::::::::::::::: 0x1 ::::::::::::::::::::::::::::::::::::::] >> General Information Advisory/Exploit Title = VideoDB Multiple Vulnerabilities Author = Valentin Hoebel Contact = valentin@xenuser.org [:::::::::::::::::::::::::::::::::::::: 0x2 ::::::::::::::::::::::::::::::::::::::] >> Product information Name = VideoDB Vendor = Andreas Götz Vendor Website = http://www.videodb.net Affected Version(s) = 3.0.3 and earlier [:::::::::::::::::::::::::::::::::::::: 0x3 ::::::::::::::::::::::::::::::::::::::] >> 1 - SQL Injection / Possible Auth Bypass The VideoDB is affected by multiple SQL Injection vulnerabilities. a) The search script search.php search.php?q=test&engine=videodb&owner=Guest&fields[]=[SQL Injection] b) The login script login.php Trigger SQL errors with the user name field or try admin' OR '1'='1 as user name. Hint: "Normal" auth bypass is not possible. c) The index.php script index.php?filter=new&quicksearch=test&owner=%3Cany%3E&mediafilter=[SQL Injection]&submit.x=0&submit.y=0 >> 2 - Local File Inclusion help.php?page=[LFI] Hint: Effective local file inclusion can be tricky. # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-10-09]</pre></body></html>