###################################################### # # Title: PHPQuiz <= v.1.2 Remote SQL injection/Code Execution Exploit # Vendor : PHPQuiz # webiste : http://www.phpquiz.com # Version : <= v.1.2 # Severity: Critical # Author: Simo64 / simo64_at_morx_org # MorX Security Reseach Team # http://www.morx.org # http://www.morx.org/phpquiz.txt # # Details : # # SQL injection #*************************** # # univers var in score.php and quiz_id var in home.php are not proprely verified and can be used to inject query # # PoC : http://localhost/phpquiz/front/?what=score&univers=[SQL] # http://localhost/phpquiz/front/?quiz=quiz&univers=1&step=1&quiz_id=[SQL] # # Arbitary File Upload #********************** # vulnerable code in back/upload_img.php and admin/upload_img.php near lines 74-76 # # 74 if (($upload) && ($ok_update == "yes")) { # 75 # 76 if(@copy($image, $path)){ # 77 ..... # # $upload , $ok_update , $image , $path variables are not sanitized and can be used to upload files # # PoC Exploit : # #