Scripts Genie Top Sites SQL Injection

2013.02.18
Credit: 3spi0n
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

################################################################################## __ _ _ ____ / /___ _____ (_)_____________ ______(_)__ _____ / __ \_________ _ __ / / __ `/ __ \/ / ___/ ___/ __ `/ ___/ / _ \/ ___// / / / ___/ __ `/ / /_/ / /_/ / / / / (__ |__ ) /_/ / / / / __(__ )/ /_/ / / / /_/ / \____/\__,_/_/ /_/_/____/____/\__,_/_/ /_/\___/____(_)____/_/ \__, / /____/ ################################################################################## Top Sites Script, SQL Injection Vulnerabilities Software Page: http://scriptsgenie.com/index.php?do=catalog&c=scripts&i=top_site_script Product Page: http://www.hotscripts.com/listing/top-sites-2-2-1/ Script Demo: http://scriptsgenie.com/demo/toplist.2.11/toplist/index.php Author(Pentester): 3spi0n On Social: Twitter.Com/eyyamgudeer Greetz: Grayhats Inc. and Janissaries Platform. ################################################################################## [~] MySQL Injection on Demo Site (/out.php?id=) >>> http://scriptsgenie.com/demo/toplist.2.11/toplist/out.php?id=20' (MySQLi Found)

References:

http://www.hotscripts.com/listing/top-sites-2-2-1/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top