Home / exploitsPDF  

[webapps / 0day] - VideoDB <= 3.0.3 Multiple Remote Vulne

Posted on 09 October 2010

<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Strict//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd'><html xmlns='http://www.w3.org/1999/xhtml'><head><meta http-equiv='Content-Type' content='text/html; charset=utf-8' /><meta http-equiv='Content-Language' content='en' /><title>VideoDB &lt;= 3.0.3 Multiple Remote Vulnerabilities | Inj3ct0r - exploit database : vulnerability : 0day : shellcode</title><meta name='description' content='VideoDB &lt;= 3.0.3 Multiple Remote Vulnerabilities by Valentin Hobel in webapps / 0day | Inj3ct0r - exploit database : vulnerability : 0day : shellcode' /><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon' /><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss' /><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></head><body><pre>================================================ VideoDB &lt;= 3.0.3 Multiple Remote Vulnerabilities ================================================ # Exploit Title: VideoDB Multiple Vulnerabilities # Date: 09.10.2010 # Author: Valentin # Category: webapps/0day # Version: 3.0.3 and earlier # Tested on: # CVE : # Code : [:::::::::::::::::::::::::::::::::::::: 0x1 ::::::::::::::::::::::::::::::::::::::] &gt;&gt; General Information Advisory/Exploit Title = VideoDB Multiple Vulnerabilities Author = Valentin Hoebel Contact = valentin@xenuser.org [:::::::::::::::::::::::::::::::::::::: 0x2 ::::::::::::::::::::::::::::::::::::::] &gt;&gt; Product information Name = VideoDB Vendor = Andreas Götz Vendor Website = http://www.videodb.net Affected Version(s) = 3.0.3 and earlier [:::::::::::::::::::::::::::::::::::::: 0x3 ::::::::::::::::::::::::::::::::::::::] &gt;&gt; 1 - SQL Injection / Possible Auth Bypass The VideoDB is affected by multiple SQL Injection vulnerabilities. a) The search script search.php search.php?q=test&amp;engine=videodb&amp;owner=Guest&amp;fields[]=[SQL Injection] b) The login script login.php Trigger SQL errors with the user name field or try admin&#039; OR &#039;1&#039;=&#039;1 as user name. Hint: &quot;Normal&quot; auth bypass is not possible. c) The index.php script index.php?filter=new&amp;quicksearch=test&amp;owner=%3Cany%3E&amp;mediafilter=[SQL Injection]&amp;submit.x=0&amp;submit.y=0 &gt;&gt; 2 - Local File Inclusion help.php?page=[LFI] Hint: Effective local file inclusion can be tricky. # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-10-09]</pre></body></html>

 

TOP