[prev in list] [next in list] [prev in thread] [next in thread] 

List:       bugtraq
Subject:    zOOM Media Gallery - Simple SQL Injection discovery
From:       "Andreas Constantinides" <aconstantinides () OdysseyConsultants ! com>
Date:       2005-04-13 5:02:12
Message-ID: C9D9636D25E0C34991E792F51CAB84E93861FD () ithaki ! odysseyconsultants ! com
[Download RAW message or body]



Description:
	zOOm Media Gallery (http://zoom.ummagumma.nl) is a php/sql 	component+module for \
MamboCMS and is in use by many sites of the internet.

	I discover a simple SQL Injection in it.
 
Affected Versions:
      zOOm Image Gallery 2.1.2, *
 
POC:
      It is possible to proof my concept using the original site of zOOM:
      	http://www.example.com/index.php?option=com_zoom&Itemid=39&catid=2+OR+1=1   
	the above url can show all images in all categories of images of the 	zOOM 	gallery \
database but other commands are also possible that can 	result in a	database owning.  \


Andreas Constantinides
www.megahz.org 
www.odysseyconsultants.com


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic