Skip to content
This repository has been archived by the owner on Aug 16, 2019. It is now read-only.

fully exploitable sqli in /ws/highdata.php (and perhaps others) #510

Open
ghost opened this issue Oct 15, 2012 · 0 comments
Open

fully exploitable sqli in /ws/highdata.php (and perhaps others) #510

ghost opened this issue Oct 15, 2012 · 0 comments

Comments

@ghost
Copy link

ghost commented Oct 15, 2012

Noticed from the sql errors displayed in issue #504 (url with the empty sessions parameter) that the /ws/highdata.php
'vid' and 'sessions' parameters are not handled safely.

This would appear to be an issue with the way sanitizer.php handles things, as that code /should/ be working - which means other things may very well have the same issue.

Edit(0): confirmed that at least newvis.php suffers from what appears at first glance to be the same issue.
Edit(1): confirmed upload.php's "id" parameter is injectable. the google_key param should also be vulnerable.

For motivation:

root:x:0:0:root:/root:/bin/bash
...
mmcguinn:x:1001:1001::/home/mmcguinn:/bin/bash
isense:x:1002:1002:isense,,,:/home/isense:/bin/bash
jdalphon:x:1003:1003:James,Dalphond,,:/home/jdalphon:/bin/bash
...
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

0 participants