[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

SuperLinks SQL Injection Vulnerability

Author
Daniel Godoy
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-16566
Category
web applications
Date add
27-07-2011
Platform
php
# Exploit Title: SuperLinks SQLi
# Google Dork: inurl:/superlinks/browse.php?id=
# Date: 27/01/2011
# Author: Daniel Godoy
# Author Mail: DanielGodoy[at]GobiernoFederal[dot]com
# Author Web: www.delincuentedigital.com.ar
# Tested on: Linux, Windows
 
[Comment]
Agradezco a mis amigos: Hernan Jais, Alfonso Cuevas, Lisandro
Lezaeta, Inyexion, Login-Root, KikoArg, Ricota,Truenex, sunplace, _tty0, TsunamiBoom
 
[POC]
http://localhost/superlinks/browse.php?id=1
 
[SQL Injection]
http://localhost/superlinks/browse.php?id=[SQLI]



#  0day.today [2024-11-16]  #