[webapps / 0day] - network411 (Product.asp?intProdID) SQL In
Posted on 27 September 2010
<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Strict//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd'><html xmlns='http://www.w3.org/1999/xhtml'><head><meta http-equiv='Content-Type' content='text/html; charset=utf-8' /><meta http-equiv='Content-Language' content='en' /><title>network411 (Product.asp?intProdID) SQL Injection Vulnerability | Inj3ct0r - exploit database : vulnerability : 0day : shellcode</title><meta name='description' content='Date: 27 Sep 2010 | Exploit category: webapps / 0day | Exploit author: Shamus | Inj3ct0r - exploit database : vulnerability : 0day : shellcode' /><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon' /><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss' /><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></head><body><pre>============================================================== network411 (Product.asp?intProdID) SQL Injection Vulnerability ============================================================== Author : Shamus Location : Solo && Jogjakarta, Indonesia Web : http://antijasakom.net/forum Critical Lvl : moderate Impact : System access Where : From Remote --------------------------------------------------------------------------- Affected software description: ~~~~~~~~~~~~~~~~~~~~~~~~~~ Application : - version : - Vendor : network411 download : - Description : - -------------------------------------------------------------------------- Vulnerability: ~~~~~~~~~~~~ - PoC/Exploit : ~~~~~~~~~~ injection type is integer http://www.victim.com/Product.asp?intProdID=[Injection query] Dork: ~~~~~ Google : [think black, you can] Solution: ~~~~~ - N/A. Timeline: ~~~~~~~ - 24 - 09 - 2010 bug found - 26 - 09 - 2010 no vendor contacted - 27 - 09 - 2010 advisory release --------------------------------------------------------------------------- Shoutz: ~~~~~~~ oO0::::: Greetz and Thanks: :::::0Oo. Tuhan YME My Parents SPYRO_KiD K-159 lirva32 newbie_campuz And Also My LuvLy : ..::.E.Z.R (The deepest Love I'v ever had..).::.. # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-09-27]</pre></body></html>