Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:21960
HistoryJun 06, 2009 - 12:00 a.m.

SQL INJECTION VULNERABILITY--Kjtechforce mailman Beta-1-->

2009-06-0600:00:00
vulners.com
14

SQL INJECTION VULNERABILITY–Kjtechforce mailman Beta-1–>

CMS INFORMATION:

–>WEB: http://sourceforge.net/projects/kjtechforce/
–>DOWNLOAD: http://sourceforge.net/projects/kjtechforce/
–>DEMO: N/A
–>CATEGORY: CMS / Mailer
–>DESCRIPTION: The kjtechforce project has aimed at the tool making
that supports kjclub.com from the outside…
–>RELEASED: 2009-05-16

CMS VULNERABILITY:

–>TESTED ON: firefox 3
–>DORK: N/A
–>CATEGORY: SQL INJECTION
–>AFFECT VERSION: CURRENT
–>Discovered Bug date: 2009-06-02
–>Reported Bug date: 2009-06-02
–>Fixed bug date: Not fixed
–>Info patch: Not fixed
–>Author: YEnH4ckEr
–>mail: y3nh4ck3r[at]gmail[dot]com
–>WEB/BLOG: N/A
–>COMMENT: A mi novia Marijose…hermano,cunyada, padres (y amigos xD) por su apoyo.
–>EXTRA-COMMENT: Gracias por aguantarme a todos! (Te kiero xikitiya!)

#########################
////////////////////////

SQL INJECTION (SQLi):

////////////////////////
#########################

<<<<---------++++++++++++++ Condition: magic quotes=OFF ++++++++++++++++±-------->>>>

[++] GET var –> 'code'

[++] File vuln –> 'activate.php'

[++] Note –> Code must be 40 characters long




[++[Return]++] ~~~~~&gt; Delete row with id=2 from &quot;mailman_activator&quot; &#40;included sha-1 code&#41;



#######################################################################
#######################################################################
##*******************************************************************##
##  SPECIAL GREETZ TO: Str0ke, JosS, Ulises2k, J. McCray, Evil1 ...  ##
##*******************************************************************##
##-------------------------------------------------------------------##
##*******************************************************************##
##              GREETZ TO: SPANISH H4ck3Rs community!                ##
##*******************************************************************##
#######################################################################
#######################################################################