| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <20061126204343.15685.qmail@securityfocus.com>
Date: 26 Nov 2006 20:43:43 -0000
From: Advisory@...a-Security.Net
To: bugtraq@...urityfocus.com
Subject: ClickGallery Sql Injection
#Aria-Security Team Advisory
#<www.Aria-security.Com For English >
#<www.Aria-Security.net For Persian >
#-----------------------------------------------------------
#Software: Click Gallery
#Method: SQL Injection And XSS
#Vendor:ClickGallery.net
#
#PoC:
#
#
#http://target/view_gallery.asp?gallery_id=809¤tpage=[SQL Injection]
#http://target/view_gallery.asp?gallery_id=[SQL injection]
#http://target/download_image.asp?image_id=[SQL Injection]
#http://target/gallery.asp?currentpage=[SQL Injection]
#http://target/view_recent.asp?currentpage=[SQL Injection]
#http://taget/gallery.asp?currentpage=2&orderby=[SQL Injection]
#
#You are able to use XSS by searching your script .
#example in Search: <script>alert('Aria-Security')</script>
#
#Contact: Advisory@...a-security.net