------------------------------------------------- thePHOTOtool SQL Injection Vulnerability By KingSerb ------------------------------------------------- Please Forgive my spelling or any mistakes i have made, Its my first discovery of a vulnerablity so please understand, and use this file for educational purposes only i hold no responsibility for what you do whith the information. ------------------------------------------------- ABOUT: This software is a photo album manager but also it has a link to go to the administration section, and from there you may edit news, homepage and ect. ------------------------------------------------- FINDING VICTIMS: a simple yahoo search for /gallery/login.asp ------------------------------------------------- DESCRIPTION: and then the login screen is vulnerable to sql injection attacks, which means that you dont need the original password but instead you put a sql code in the password field, and in the username the default user name being "admin". in the login script the onLoad="document.forms.loginForm.login.focus()"> is thought to be the problem. ------------------------------------------------- PROOF OF CONCEPT: username: admin password: hi' or 'a'='a ------------------------------------------------- VENDOR CONTACT: www.steelid.com vendor has been contacted. ------------------------------------------------- CONTACT ME: email: KingSerb [AT] Linuxmail [DOT] org Msn: serbian_sniper [AT] Hotmail [DOT] com *email has been put in this form because of spammers and email harvesters* ------------------------------------------------- Vulnerability found on 30/01/04. _________________________________________________________________ Hot chart ringtones and polyphonics. Go to http://ninemsn.com.au/mobilemania/default.asp