Exploit Battle Blog 1.25 - Authentication Bypass / SQL Injection / HTML Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
9183
Проверка EDB
  1. Пройдено
Автор
$QL_DOCT0R
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2009-3719 cve-2009-3718
Дата публикации
2009-07-17
Код:
###################################################################
#        battle blog sql/html injection vulnerability             #
###################################################################

author: $qL_DoCt0r
email: [email protected]
msn: [email protected]
blog: http://full-discl0sure.blogspot.com

html injection vulnerability

dork:inurl:comment.asp intext:Your e-mail address will be used to send you voting and comment activity. Inclusion of your address is optional but Battle Blog cannot notify you of these activities unless you supply an accurate e-mail.

once on blog...
scroll down to: make new comment

fill in the name: website: e-mail: forms
then type your html/xss as the comment, eg:<meta HTTP-EQUIV="REFRESH" content="0; url=http://yoursite.com/deface.htm">
click preview
then submit
if your doing a redirect you need to click submit fast
NOTE: iframes do not work because the submit button doesn't appear
on some blogs you can use fire bug to make a submit button!


sql injection vulnerability

dork: same as before

just look on the navigation bar to the side and click admin

type your sql as the username
and leave the password field blank.

# milw0rm.com [2009-07-17]
 
Источник
www.exploit-db.com

Похожие темы