-
-
[转帖]# Exploit Title : Joomla "com_yellowpages" Sql Injection Vulnerability
-
发表于: 2010-8-10 08:02 2419
-
[转帖]# Exploit Title : Joomla "com_yellowpages" Sql Injection Vulnerability
2010-8-10 08:02
2419
#Title: Php Nuke Blind Sql Injection 8.x.x
#Vendor: 376K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4m8Z5M7q4)9J5k6r3&6#2K9$3g2Q4x3X3g2G2M7X3N6Q4x3V1k6Q4x3U0k6F1j5Y4y4H3i4K6y4n7i4K6t1$3L8X3u0K6M7q4)9K6b7R3`.`.
#######################################################################
#AUTHOR: ITSecTeam
#Email: Bug@ITSecTeam.com
#Website: 966K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3W2@1M7$3g2U0N6r3g2S2L8g2)9J5k6h3y4G2L8g2)9J5y4X3&6T1M7%4m8Q4x3@1u0Q4x3U0k6F1j5Y4y4H3i4K6y4n7
#Forum : 73dK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3k6G2M7Y4g2E0i4K6u0W2d9g2c8e0k6h3y4f1k6h3q4E0i4K6u0W2j5$3!0E0i4K6t1$3L8X3u0K6M7q4)9K6b7W2)9J5y4X3&6T1M7%4m8Q4x3@1t1`.
#Advisory:882K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6f1W2f1f1$3g2U0g2r3g2S2L8g2)9J5k6h3y4G2L8g2)9J5c8X3g2F1i4K6u0r3N6Y4g2D9L8X3g2J5j5h3u0A6L8r3W2@1K9h3g2K6i4K6u0r3N6Y4g2D9L8X3g2J5j5h3u0A6L8r3W2@1P5e0f1^5i4K6u0W2K9s2c8E0i4K6t1$3L8X3u0K6M7q4)9K6b7W2)9J5y4X3&6T1M7%4m8Q4x3@1t1`.
#Thanks: M3hr@n$,r3dm0v3,am!rkh@n,Platen,Erfan.Blackhat and Dosib
#Discovered By Amin Shokohi(Pejvak)
######################################################################
Poc :modules\Web_Links\index.php line:223
function Add($title, $url, $auth_name, $cat, $description, $email) {
global $prefix, $db, $user;
$url = filter($url, "nohtml");
$result = $db->sql_query("SELECT url from ".$prefix."_links_links where
url='$url'");
$numrows = $db->sql_numrows($result);
if ($numrows>0) {......
######################################################################
#Bug : b92K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4A6N6r3g2Q4x3X3g2U0L8$3#2Q4x3V1k6E0L8$3c8#2L8r3g2K6i4K6u0W2M7r3S2H3i4K6y4r3L8X3q4E0k6g2)9K6c8q4N6W2j5W2)9#2k6V1I4A6L8X3E0K6i4K6t1$3L8q4)9#2k6X3!0H3i4K6y4p5b7h3c8V1i4K6t1$3N6i4u0D9i4K6y4p5M7%4q4D9 Injection
######################################################################
#Vendor: 376K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4m8Z5M7q4)9J5k6r3&6#2K9$3g2Q4x3X3g2G2M7X3N6Q4x3V1k6Q4x3U0k6F1j5Y4y4H3i4K6y4n7i4K6t1$3L8X3u0K6M7q4)9K6b7R3`.`.
#######################################################################
#AUTHOR: ITSecTeam
#Email: Bug@ITSecTeam.com
#Website: 966K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3W2@1M7$3g2U0N6r3g2S2L8g2)9J5k6h3y4G2L8g2)9J5y4X3&6T1M7%4m8Q4x3@1u0Q4x3U0k6F1j5Y4y4H3i4K6y4n7
#Forum : 73dK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3k6G2M7Y4g2E0i4K6u0W2d9g2c8e0k6h3y4f1k6h3q4E0i4K6u0W2j5$3!0E0i4K6t1$3L8X3u0K6M7q4)9K6b7W2)9J5y4X3&6T1M7%4m8Q4x3@1t1`.
#Advisory:882K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6f1W2f1f1$3g2U0g2r3g2S2L8g2)9J5k6h3y4G2L8g2)9J5c8X3g2F1i4K6u0r3N6Y4g2D9L8X3g2J5j5h3u0A6L8r3W2@1K9h3g2K6i4K6u0r3N6Y4g2D9L8X3g2J5j5h3u0A6L8r3W2@1P5e0f1^5i4K6u0W2K9s2c8E0i4K6t1$3L8X3u0K6M7q4)9K6b7W2)9J5y4X3&6T1M7%4m8Q4x3@1t1`.
#Thanks: M3hr@n$,r3dm0v3,am!rkh@n,Platen,Erfan.Blackhat and Dosib
#Discovered By Amin Shokohi(Pejvak)
######################################################################
Poc :modules\Web_Links\index.php line:223
function Add($title, $url, $auth_name, $cat, $description, $email) {
global $prefix, $db, $user;
$url = filter($url, "nohtml");
$result = $db->sql_query("SELECT url from ".$prefix."_links_links where
url='$url'");
$numrows = $db->sql_numrows($result);
if ($numrows>0) {......
######################################################################
#Bug : b92K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4A6N6r3g2Q4x3X3g2U0L8$3#2Q4x3V1k6E0L8$3c8#2L8r3g2K6i4K6u0W2M7r3S2H3i4K6y4r3L8X3q4E0k6g2)9K6c8q4N6W2j5W2)9#2k6V1I4A6L8X3E0K6i4K6t1$3L8q4)9#2k6X3!0H3i4K6y4p5b7h3c8V1i4K6t1$3N6i4u0D9i4K6y4p5M7%4q4D9 Injection
######################################################################
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课
赞赏
他的文章
赞赏
雪币:
留言: