Home / os / win7

[webapps / 0day] - HotWebScripts HotWeb Rentals SQL Injectio

Posted on 05 December 2010

<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Strict//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd'><html xmlns='http://www.w3.org/1999/xhtml'><head><meta http-equiv='Content-Type' content='text/html; charset=utf-8' /><meta http-equiv='Content-Language' content='en' /><title>HotWebScripts HotWeb Rentals SQL Injection Vulnerability | Inj3ct0r - exploit database : vulnerability : 0day : shellcode</title><meta name='description' content='HotWebScripts HotWeb Rentals SQL Injection Vulnerability by R4dc0re in webapps / 0day | Inj3ct0r 1337 - exploit database : vulnerability : 0day : shellcode' /><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon' /><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss' /><script type='text/javascript'>var _gaq = _gaq || [];_gaq.push(["_setAccount", "UA-12725838-1"]);_gaq.push(["_setDomainName", "none"]);_gaq.push(["_setAllowLinker", true]);_gaq.push(["_trackPageview"]);(function(){var ga = document.createElement("script"); ga.type = "text/javascript"; ga.async = true;ga.src = ("https:" == document.location.protocol ? "https://ssl" : "http://www") + ".google-analytics.com/ga.js";var s = document.getElementsByTagName("script")[0]; s.parentNode.insertBefore(ga, s);})();</script></head><body><pre>======================================================== HotWebScripts HotWeb Rentals SQL Injection Vulnerability ======================================================== 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=1 3 3 3 _ __ __ ________ __ __ 3 7 /&#039; /&#039;__` /&#039;__` /\_____ / / 7 1 /\_, /\_L /\_L \/___//&#039;/&#039; \_ \____ 1 3 /_/ /_/_\_&lt;_/_/_\_&lt;_ /&#039; /&#039; /&#039;_` &#039;__` 3 3 / L / L /&#039; /&#039; / L L 3 7 \_ \____/ \____//\_/ \___,_ \_,__/ 7 1 /_//___/ /___/ // /__,_ //___/ 1 3 &gt;&gt; Exploit database separated by exploit 3 3 type (local, remote, DoS, etc.) 3 7 7 1 [+] Site : 1337db.com 1 3 [+] Support e-mail : submit[at]1337db.com 3 3 3 7 ########################################## 7 1 I&#039;m R4dc0re 1337 Member from 1337 DataBase 1 3 ########################################## 3 3 3 7-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-7 # Author: R4dc0re # Exploit Title: HotWebScripts HotWeb Rentals SQL injection Vulnerability # Date: 05-12-2010 # Vendor or Software Link: http://www.hotwebscripts.co.uk/ # Category:WebApp # Demo Link:http://holidayrentals.hotwebscripts.co.uk/ # Price: £150 # Contact: R4dc0re@yahoo.fr # Website: www.1337db.com # Greetings to: R0073r(1337db.com), L0rd CrusAd3r,Sid3^effects and to rest of the 1337db members Submit Your Exploit at Submit@1337db.com ######################################################################################## [Product Detail] DotWeb Rentals is a simple to operate, ASP/Access database application that can be used to list property owner&#039;s homes for rent. Owners post their home, along with up to 6 images and a comprehensive list of details. The application is best suited to small to medium property rental sites and in particular, to holiday rentals such as Spanish property or Polaris World type property rentals. [Vulnerability] SQL Injection: http://holidayrentals.hotwebscripts.co.uk/resorts.asp?PropResort=[code] ######################################################################################## # <a href='http://1337db.com/'>1337db.com</a> [2010-12-05]</pre></body></html>

 

TOP