ID PACKETSTORM:104426 Type packetstorm Reporter tempe_mendoan Modified 2011-08-25T00:00:00
Description
`+------------------------------------------------------------------------------------------+
|-------------------------[ Stralia Web SQL Injection Vulnerability ]------------------------|
+------------------------------------------------------------------------------------------+
[+] Google Dork : "gorengan tempe" intext:"intext:Site Design by Stralia Web"
[+] Date: 2011-08-24
[+] Author: tempe_mendoan
[+] Author Contact: devilzc0de.tempe@gmail.com
[+] Home Page : http://devilzc0detempe.wordpress.com/
[+] Vendor or Software Link: http://www.straliaweb.com.au/
[+] Price : $66
[+] Tested on: Windows Bajakan
[+] Platform: Asp
--------------------------------------------------------------------------------------------
Info :
Business Name: Stralia Web
Parent Company: Blue Mountains Web Pty. Ltd.
Details:
Search google is dork, inejct website . contact admin and patch website :P
Example Vulnerable :
http://website/[path]/catalog.asp?ID=[SQL]
http://website/directory_categories.asp?id=[SQL]
http://website/directory.asp?ID=[SQL]
http://website/content.asp?id=[SQL]
Greats T0 :
./ And All My Friend
Thanks :
./ kang r3m1ck Insya Allah tanngal 28 aku mudik iki , jo lali bakso neng alun2 yo =))
./ mas kaMz lan mas Farhatz suwun yo mas :D walau saiki wis ra tahu chat koyo disik :(
./ Kang chaer yang selalu memberi semangat tapi sayang ane jadi ketularan koplak nya kang =))
./ AdeYonatan semangat kawan \m/
./ Mas v3n0m yang menemani twitteran, di tunggu mas script e yo :D
./ my Love Dyla semoga cepat sembuh ya, Ku sayang kamu :*
`
{"hash": "bba91c8452c41d2011534d4f888ffd297bab55e21828137bb93b72e157d7fecc", "sourceHref": "https://packetstormsecurity.com/files/download/104426/straliaweb-sql.txt", "title": "Stralia Web SQL Injection", "id": "PACKETSTORM:104426", "published": "2011-08-25T00:00:00", "description": "", "modified": "2011-08-25T00:00:00", "sourceData": "`+------------------------------------------------------------------------------------------+ \n|-------------------------[ Stralia Web SQL Injection Vulnerability ]------------------------| \n+------------------------------------------------------------------------------------------+ \n[+] Google Dork : \"gorengan tempe\" intext:\"intext:Site Design by Stralia Web\" \n[+] Date: 2011-08-24 \n[+] Author: tempe_mendoan \n[+] Author Contact: devilzc0de.tempe@gmail.com \n[+] Home Page : http://devilzc0detempe.wordpress.com/ \n[+] Vendor or Software Link: http://www.straliaweb.com.au/ \n[+] Price : $66 \n[+] Tested on: Windows Bajakan \n[+] Platform: Asp \n-------------------------------------------------------------------------------------------- \n \nInfo : \n \nBusiness Name: Stralia Web \nParent Company: Blue Mountains Web Pty. Ltd. \n \nDetails: \n \nSearch google is dork, inejct website . contact admin and patch website :P \n \nExample Vulnerable : \n \nhttp://website/[path]/catalog.asp?ID=[SQL] \nhttp://website/directory_categories.asp?id=[SQL] \nhttp://website/directory.asp?ID=[SQL] \nhttp://website/content.asp?id=[SQL] \n \nGreats T0 : \n \n./ And All My Friend \n \nThanks : \n \n./ kang r3m1ck Insya Allah tanngal 28 aku mudik iki , jo lali bakso neng alun2 yo =)) \n./ mas kaMz lan mas Farhatz suwun yo mas :D walau saiki wis ra tahu chat koyo disik :( \n./ Kang chaer yang selalu memberi semangat tapi sayang ane jadi ketularan koplak nya kang =)) \n./ AdeYonatan semangat kawan \\m/ \n./ Mas v3n0m yang menemani twitteran, di tunggu mas script e yo :D \n./ my Love Dyla semoga cepat sembuh ya, Ku sayang kamu :* \n \n`\n", "reporter": "tempe_mendoan", "hashmap": [{"key": "bulletinFamily", "hash": "708697c63f7eb369319c6523380bdf7a"}, {"key": "cvelist", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cvss", "hash": "d4be9c4fc84262b4f39f89565918568f"}, {"key": "description", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "href", "hash": "a027441969e091bf814e867f0d8631e5"}, {"key": "modified", "hash": "53182acf23b5fabc171eca341daecc51"}, {"key": "objectVersion", "hash": "56765472680401499c79732468ba4340"}, {"key": "published", "hash": "53182acf23b5fabc171eca341daecc51"}, {"key": "references", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "reporter", "hash": "a43ee8d0fd5a47913d2e5080a17bd318"}, {"key": "sourceData", "hash": "5ed70f777e2cda5e291fc0067ca63e4a"}, {"key": "sourceHref", "hash": "20b645d35d923f498e91dcf4dc96da1c"}, {"key": "title", "hash": "f48a80210c41ef67838a68f12743b6b8"}, {"key": "type", "hash": "6466ca3735f647eeaed965d9e71bd35d"}], "cvss": {"vector": "NONE", "score": 0.0}, "references": [], "type": "packetstorm", "cvelist": [], "history": [], "bulletinFamily": "exploit", "objectVersion": "1.2", "edition": 1, "href": "https://packetstormsecurity.com/files/104426/Stralia-Web-SQL-Injection.html", "lastseen": "2016-11-03T10:16:40", "viewCount": 0, "enchantments": {"vulnersScore": 6.1}}