=============================================================================== Calendarix (cal_cat.php) SQL Injection Vulnerability =============================================================================== Author : SixP4ck3r Email & msn : SixP4ck3r@Bolivia.com Date : 17 July 2010 Critical Lvl : High Impact : Exposure of sensitive information Where : From Remote web : http://foro.nbsecurity.net/ Credits : Diablada and Caporal is Bolivian Dork : inurl:cal_cat.php?op= --------------------------------------------------------------------------- [Sofware afected info] Calendarix it's a events manager based in web write in php, requiere mysql for database. [Download] http://www.calendarix.com/ [Afected versions] All + 0 day --------------------------------------------------------------------------- [Bug] if ($limit>$totalrows) $limit = 0 ; $query .= " LIMIT ".$limit.",".$limitrow ; $query = "select ".$qstr.$query ; // echo "

".$query."

"; $result = mysql_query($query); $rowname = mysql_fetch_object($result); $rows = mysql_num_rows($result); --------------------------------------------------------------------------- [Exploting..demo] http://example/[path]/calendar/cal_cat.php?op=cat&id=1&year=2010&sort=&catmonth=6&catview=0&limit=[SQL] --------------------------------------------------------------------------- With R3gards, SixP4ck3r from Bolivia ___eof____