Twenty Year Anniversary

Vastal I-tech phpVID 1.2.3 SQL Injection

Vastal I-tech phpVID 1.2.3 SQL Injection
Posted Mar 11, 2015
Authored by Jing Wang

Vastal I-tech phpVID version 1.2.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | fe3f6dd04ba35093eebf50c76c6f29f1

Vastal I-tech phpVID 1.2.3 SQL Injection

Change Mirror Download
*Vastal I-tech phpVID 1.2.3 SQL Injection Security Vulnerabilities*


Exploit Title: Vastal I-tech phpVID /groups.php Multiple Parameters SQL
Injection Security Vulnerabilities
Product: phpVID
Vendor: Vastal I-tech
Vulnerable Versions: 1.2.3 0.9.9
Tested Version: 1.2.3 0.9.9
Advisory Publication: March 10, 2015
Latest Update: March 10, 2015
Vulnerability Type: Improper Neutralization of Special Elements used in an
SQL Command ('SQL Injection') [CWE-89]
CVE Reference: *
Impact CVSS Severity (version 2.0):
CVSS v2 Base Score: 7.5 (HIGH) (AV:N/AC:L/Au:N/C:P/I:P/A:P) (legend)
Impact Subscore: 6.4
Exploitability Subscore: 10.0
Credit: Wang Jing [Mathematics, Nanyang Technological University (NTU),
Singapore]







*Advisory Details:*


*(1) Vendor & Product Description:*


*Vendor:*
Vastal I-tech



*Product & Vulnerable Versions:*
phpVID
1.2.3
0.9.9



*Vendor URL & Download:*
phpVID can be bought from here,
http://www.vastal.com/phpvid-the-video-sharing-software.html#.VP7aQ4V5MxA



*Product Introduction:*
"phpVID is a video sharing software or a video shating script and has all
the features that are needed to run a successful video sharing website like
youtube.com. The features include the following. phpVID is the best youtube
clone available. The latest features include the parsing of the subtitles
file and sharing videos via facebook. With phpVID Video Sharing is
extremely easy."

"The quality of code and the latest web 2.0 technologies have helped our
customers to achieve their goals with ease. Almost all customers who have
purchased phpVID are running a successful video sharing website. The
quality of code has helped in generating more then 3 million video views a
month using a "single dedicated server". phpVID is the only software in
market which was built in house and not just purchased from someone. We
wrote the code we know the code and we support the code faster then anyone
else. Have any questions/concerns please contact us at: info@vastal.com.
See demo at: www.phpvid.com. If you would like to see admin panel demo
please email us at: info@vastal.com."

"Server Requirements:
Preferred Server: Linux any Version
PHP 4.1.0 or above
MySQL 3.1.10 or above
GD Library 2.0.1 or above
Mod Rewrite and .htaccess enabled on server.
FFMPEG (If you wish to convert the videos to Adobe Flash)"





*(2) Vulnerability Details:*
phpVID web application has a security bug problem. It can be exploited by
SQL Injection attacks. This may allow an attacker to inject or manipulate
SQL queries in the back-end database, allowing for the manipulation or
disclosure of arbitrary data. Other bug hunter researchers have found some
SQL Injection vulnerabilities related to it before, too. phpVID has patched
some of them.


*(2.1) *The first code programming flaw occurs at "groups.php?" page with
"&order_by" "&cat" parameters.








*References:*
http://tetraph.com/security/sql-injection-vulnerability/vastal-i-tech-phpvid-1-2-3-sql-injection-security-vulnerabilities/
http://securityrelated.blogspot.com/2015/03/vastal-i-tech-phpvid-123-sql-injection.html
http://www.inzeed.com/kaleidoscope/computer-web-security/vastal-i-tech-phpvid-1-2-3-sql-injection-security-vulnerabilities/
http://diebiyi.com/articles/%E5%AE%89%E5%85%A8/vastal-i-tech-phpvid-1-2-3-sql-injection-security-vulnerabilities/
https://webtechwire.wordpress.com/2015/03/10/vastal-i-tech-phpvid-1-2-3-sql-injection-security-vulnerabilities/
http://static-173-79-223-25.washdc.fios.verizon.net/?l=full-disclosure&m=142551597501701&w=2
https://cxsecurity.com/issue/WLB-2015020091





--
Wang Jing,
Division of Mathematical Sciences (MAS),
School of Physical and Mathematical Sciences (SPMS),
Nanyang Technological University (NTU),
Singapore.
http://www.tetraph.com/wangjing/
https://twitter.com/tetraphibious


Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

October 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    26 Files
  • 2
    Oct 2nd
    15 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    15 Files
  • 6
    Oct 6th
    2 Files
  • 7
    Oct 7th
    3 Files
  • 8
    Oct 8th
    23 Files
  • 9
    Oct 9th
    16 Files
  • 10
    Oct 10th
    15 Files
  • 11
    Oct 11th
    19 Files
  • 12
    Oct 12th
    16 Files
  • 13
    Oct 13th
    2 Files
  • 14
    Oct 14th
    2 Files
  • 15
    Oct 15th
    15 Files
  • 16
    Oct 16th
    20 Files
  • 17
    Oct 17th
    19 Files
  • 18
    Oct 18th
    21 Files
  • 19
    Oct 19th
    16 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close