header-logo
Suggest Exploit
vendor:
Quicktech
by:
eXeSoul
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Quicktech
Affected Version From: All
Affected Version To: All
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows/Linux
2011

Quicktech [Sql Injection Vulnerability]

A SQL injection vulnerability exists in Quicktech, which allows an attacker to execute arbitrary SQL commands on the underlying database. This can be exploited to manipulate data, disclose sensitive information, or gain access to the system. Affected versions include all versions of Quicktech.

Mitigation:

Input validation should be used to prevent SQL injection attacks. Additionally, parameterized queries should be used to prevent SQL injection attacks.
Source

Exploit-DB raw data:

#########################################################################
  
[+] Exploit Title : Quicktech  [ Sql Injection Vulnerability]
[+] Author : eXeSoul
[+] Contact : exe.soul@live.com
[+] Date : 02-03-2011
[+] category: Web Apps [SQli]
[+] HomePage : www.indishell.in
[+] Version : all
[+] Tested on : windows/linux 
[+] Vulnerability Style : PHP [ Sql Injection Vunerability ]
[+] Vendor: www.quicktech.ca
[+] VCE: ()
[+] Dork :  "Copyright 2010, Quicktech" OR inurl:leftmenubody.php?id=
#########################################################################

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
<3 Love: -[SiLeNtp0is0n]-, stRaNgEr(lucky), inX_rOot, NEO H4cK3R, DarkL00k, Th3 RDX, G00g!3 W@rr!0r, Nazz ,
r45c4l, str1k3r, co0Lt04d , ATUL DWIVEDI , Jackh4xor , Bon3 ,Badboy-Albinia, Mr.SK , I-H Guru,
X__HMG, AK-47, [ICW] [Andhra Hackers]
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
 
 
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
                           ......\m/ INDIAN CYBER ARMY \m/......
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

Vulnerability:
  
*SQL injection Vulnerability*
 
 
[#] http://server/content.php?id=[sqli]
[#] http://server/leftmenubody.php?id=[sqli]
[#] http://server/leftmenubody1.php?id=[sqli]
[#] http://server/newsdetail1.php?id=[sqli]
[#] http://server/news.php?page=[sqli]
[#] http://server/content.php?id=[sqli]

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
=> PROUD TO BE AN INDIAN | Anythning for INDIA | JAI-HIND | Maa Tujhe Salam
   
=> c0d3 for motherland, h4ck for motherland
  
 
      
     Enj0y! :D
 
 
[#] DOne now time to rock \m/
  
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


# JAY HIND.!! JAY SHREE RAM.!! JAY SHREE KRISHANA.!! JAY MAHADEV.!!

# eXploit-db.com [02-03-2011]
  
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
  
finish(0);
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
  
#End 0Day#